File name:

Product.msi

Full analysis: https://app.any.run/tasks/26cde5e1-a71a-48a4-96d4-e5572c440621
Verdict: Malicious activity
Analysis date: March 25, 2025, 03:07:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
generated-doc
arch-exec
arch-doc
python
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Code page: 1252, Title: Installation Database, Subject: Windows Software Development Kit 4.1.5.0 Installer, Author: Microsoft Corporation, Keywords: Installer, Comments: Windows Software Development Kit for Windows Store Apps, Template: Intel;1033, Revision Number: {26BAB16F-4FF3-486D-803F-A5ED6FF890A7}, Create Time/Date: Fri Mar 21 10:13:26 2025, Last Saved Time/Date: Fri Mar 21 10:13:26 2025, Number of Pages: 200, Number of Words: 2, Name of Creating Application: Windows Installer XML Toolset (3.14.1.8722), Security: 2
MD5:

2FB80D73656ACA3D0E777311189E56A3

SHA1:

8E3A7D00997F331ECAF2530E96A4636228F34918

SHA256:

05BB855D9EBDBB0749113ACD50FDA0B03C3F050F97AFC5F5C4637C924D326F94

SSDEEP:

98304:nLagAHOVTjVXA74JQf/1sgvtbibnd+bi4r26MD/v2NA45jFeMCdB2YqerrHW16gt:nHUjRAy2Yk0kWqcEJWjxlMZ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • msiexec.exe (PID: 2236)
  • SUSPICIOUS

    • Executes as Windows Service

      • VSSVC.exe (PID: 5680)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6424)
    • Process drops python dynamic module

      • msiexec.exe (PID: 6424)
    • Loads Python modules

      • pythonw.exe (PID: 4880)
    • Process drops legitimate windows executable

      • msiexec.exe (PID: 6424)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 6424)
    • Starts CMD.EXE for commands execution

      • msiexec.exe (PID: 6424)
    • Reads security settings of Internet Explorer

      • pythonw.exe (PID: 4880)
  • INFO

    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 6424)
    • Reads the computer name

      • msiexec.exe (PID: 6424)
      • pythonw.exe (PID: 4880)
    • Checks supported languages

      • msiexec.exe (PID: 6424)
      • pythonw.exe (PID: 4880)
    • Manages system restore points

      • SrTasks.exe (PID: 6032)
    • The sample compiled with english language support

      • msiexec.exe (PID: 6424)
    • Python executable

      • pythonw.exe (PID: 4880)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6424)
    • Application launched itself

      • Acrobat.exe (PID: 5416)
      • AcroCEF.exe (PID: 7292)
    • Reads the machine GUID from the registry

      • pythonw.exe (PID: 4880)
    • Checks proxy server information

      • pythonw.exe (PID: 4880)
    • Reads the software policy settings

      • pythonw.exe (PID: 4880)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.msi | Microsoft Installer (100)

EXIF

FlashPix

CodePage: Windows Latin 1 (Western European)
Title: Installation Database
Subject: Windows Software Development Kit 4.1.5.0 Installer
Author: Microsoft Corporation
Keywords: Installer
Comments: Windows Software Development Kit for Windows Store Apps
Template: Intel;1033
RevisionNumber: {26BAB16F-4FF3-486D-803F-A5ED6FF890A7}
CreateDate: 2025:03:21 10:13:26
ModifyDate: 2025:03:21 10:13:26
Pages: 200
Words: 2
Software: Windows Installer XML Toolset (3.14.1.8722)
Security: Read-only recommended
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
150
Monitored processes
20
Malicious processes
0
Suspicious processes
1

Behavior graph

Click at the process to see the details
start msiexec.exe no specs msiexec.exe vssvc.exe no specs srtasks.exe no specs conhost.exe no specs pythonw.exe cmd.exe no specs conhost.exe no specs acrobat.exe acrobat.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs acrocef.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
720cmd.exe /C start "" "C:\Users\admin\AppData\Local\Hotfix\files\Password.pdf"C:\Windows\System32\cmd.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
2236"C:\Windows\System32\msiexec.exe" /i C:\Users\admin\AppData\Local\Temp\Product.msiC:\Windows\System32\msiexec.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
4880"C:\Users\admin\AppData\Local\Hotfix\files\pythonw.exe" "C:\Users\admin\AppData\Local\Hotfix\files\win_socks.py"C:\Users\admin\AppData\Local\Hotfix\files\pythonw.exe
msiexec.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Version:
3.12.9
Modules
Images
c:\users\admin\appdata\local\hotfix\files\pythonw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\hotfix\files\vcruntime140.dll
c:\users\admin\appdata\local\hotfix\files\python312.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
5408\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5408"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" --type=renderer /prefetch:1 "C:\Users\admin\AppData\Local\Hotfix\files\Password.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeAcrobat.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5416"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\admin\AppData\Local\Hotfix\files\Password.pdf"C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
cmd.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat
Version:
23.1.20093.0
Modules
Images
c:\program files\adobe\acrobat dc\acrobat\acrobat.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5680C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6032C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6424C:\WINDOWS\system32\msiexec.exe /VC:\Windows\System32\msiexec.exe
services.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
6800\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
19 346
Read events
18 931
Write events
396
Delete events
19

Modification events

(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SystemRestore
Operation:writeName:SrCreateRp (Enter)
Value:
480000000000000029389411339DDB011819000080100000D50700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Enter)
Value:
480000000000000029389411339DDB011819000080100000D20700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGetSnapshots (Leave)
Value:
480000000000000084A2F311339DDB011819000080100000D20700000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Enter)
Value:
480000000000000084A2F311339DDB011819000080100000D10700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppEnumGroups (Leave)
Value:
4800000000000000CD6AF811339DDB011819000080100000D10700000100000000000000010000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppCreate (Enter)
Value:
4800000000000000F5BAFA11339DDB011819000080100000D00700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
Operation:writeName:LastIndex
Value:
11
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SPP
Operation:writeName:SppGatherWriterMetadata (Enter)
Value:
4800000000000000A16D8612339DDB011819000080100000D30700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(6424) msiexec.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\VssapiPublisher
Operation:writeName:IDENTIFY (Enter)
Value:
4800000000000000459A8C12339DDB0118190000D4150000E80300000100000000000000000000004C6E1B09B6EBC345BC6DE2D40EC460E700000000000000000000000000000000
(PID) Process:(5680) VSSVC.exeKey:HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer
Operation:writeName:IDENTIFY (Enter)
Value:
48000000000000005D289812339DDB013016000088030000E80300000100000001000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
31
Suspicious files
199
Text files
17
Unknown types
0

Dropped files

PID
Process
Filename
Type
6424msiexec.exeC:\System Volume Information\SPP\metadata-2
MD5:
SHA256:
6424msiexec.exeC:\Windows\Installer\1124ac.msi
MD5:
SHA256:
6424msiexec.exeC:\Users\admin\AppData\Local\Hotfix\files\libssl-3.dllexecutable
MD5:4FF168AAA6A1D68E7957175C8513F3A2
SHA256:2E4D35B681A172D3298CAF7DC670451BE7A8BA27C26446EFC67470742497A950
6424msiexec.exeC:\Windows\Installer\MSI2B53.tmpbinary
MD5:2A75E77A938C312233F41243C782A085
SHA256:6F37CE6E03F7DE86A1F944817D33CFF4D7FB9A8A8B2C50A3AC805145723FCD0D
6424msiexec.exeC:\Users\admin\AppData\Local\Hotfix\files\python312._pthtext
MD5:535C72E819D6B1E99FC4E85D68784E78
SHA256:2820F241BC9D6810D4DB21C21CCA3845799367FBDF0199620FB37C86A74B945C
6424msiexec.exeC:\Users\admin\AppData\Local\Hotfix\files\python3.dllexecutable
MD5:3887ABD76341942ACEF5EAF8999FD3D1
SHA256:BAF0054AA490AEBA30AEE3F06ED06339478511006172B86917C02F450ED7E5E4
6424msiexec.exeC:\System Volume Information\SPP\OnlineMetadataCache\{091b6e4c-ebb6-45c3-bc6d-e2d40ec460e7}_OnDiskSnapshotPropbinary
MD5:964F415401CDE768DBCAB2B51D28E1EF
SHA256:84A9858FC192FE7D00FF0645E4DF44F8251D04A7EDBF08A36F8B36D11EF2D91D
6424msiexec.exeC:\Users\admin\AppData\Local\Hotfix\files\_sqlite3.pydexecutable
MD5:D8830605D340B89523CFDFA9094BA7D8
SHA256:256D6D270945DA4F597F0CA1DC017B8450C8956B660831FA49F8992EE5F80DC7
6424msiexec.exeC:\Windows\Temp\~DF9710654928C884A5.TMPbinary
MD5:BF619EAC0CDF3F68D496EA9344137E8B
SHA256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
6424msiexec.exeC:\Windows\Installer\inprogressinstallinfo.ipibinary
MD5:A9DDEAD5C4DB207DB6C911571BE03B37
SHA256:E352526735AA03007299E60C595761F0689EFB552C00FFA9D54EDA3635976395
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
58
DNS requests
20
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4220
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
unknown
5416
Acrobat.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAfy81yHqHeveu%2FpR5k1Jb0%3D
unknown
unknown
4220
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
unknown
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
6192
backgroundTaskHost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
unknown
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
23.53.40.176:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
3216
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
20.190.160.67:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
unknown
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6192
backgroundTaskHost.exe
20.103.156.88:443
arc.msn.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
unknown
6192
backgroundTaskHost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
unknown
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
unknown
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
unknown
client.wns.windows.com
  • 40.115.3.253
unknown
login.live.com
  • 20.190.160.67
  • 20.190.160.2
  • 20.190.160.20
  • 40.126.32.138
  • 20.190.160.130
  • 20.190.160.128
  • 20.190.160.4
  • 40.126.32.133
unknown
ocsp.digicert.com
  • 184.30.131.245
  • 2.23.77.188
unknown
arc.msn.com
  • 20.103.156.88
unknown
go.microsoft.com
  • 2.18.97.227
unknown
slscr.update.microsoft.com
  • 52.149.20.212
unknown
www.microsoft.com
  • 2.23.246.101
unknown

Threats

No threats detected
No debug info