File name:

wininit.exe

Full analysis: https://app.any.run/tasks/dc1159cd-c7b7-48c5-b330-98e3b13aa829
Verdict: Malicious activity
Threats:

DCrat, also known as Dark Crystal RAT, is a remote access trojan (RAT), which was first introduced in 2018. It is a modular malware that can be customized to perform different tasks. For instance, it can steal passwords, crypto wallet information, hijack Telegram and Steam accounts, and more. Attackers may use a variety of methods to distribute DCrat, but phishing email campaigns are the most common.

Analysis date: July 18, 2025, 14:09:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
dcrat
rat
stealer
remote
darkcrystal
netreactor
api-base64
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 4 sections
MD5:

B1E117B780C2AFB3DA1571FBB20A3546

SHA1:

F02C4038FE89E7F048B681CC48C15E421626C375

SHA256:

06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996

SSDEEP:

49152:+JkwGQ6dxUV+9OOzZM9TATiBisUbFCiXsOZ0beVu3tDBmP:+Js68zZMaTiBbUbFZXsOZGM

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • DCRAT mutex has been found

      • RuntimeBroker.exe (PID: 1592)
    • DARKCRYSTAL has been detected (SURICATA)

      • RuntimeBroker.exe (PID: 1592)
    • Actions looks like stealing of personal data

      • RuntimeBroker.exe (PID: 1592)
    • DCRAT has been detected (YARA)

      • RuntimeBroker.exe (PID: 1592)
  • SUSPICIOUS

    • Executed via WMI

      • schtasks.exe (PID: 2508)
      • schtasks.exe (PID: 6948)
      • schtasks.exe (PID: 3980)
      • schtasks.exe (PID: 7080)
      • schtasks.exe (PID: 2168)
      • schtasks.exe (PID: 3480)
      • schtasks.exe (PID: 2716)
      • schtasks.exe (PID: 4088)
      • schtasks.exe (PID: 3840)
      • schtasks.exe (PID: 5236)
      • schtasks.exe (PID: 2384)
      • schtasks.exe (PID: 1216)
      • schtasks.exe (PID: 2312)
      • schtasks.exe (PID: 4844)
      • schtasks.exe (PID: 1740)
      • schtasks.exe (PID: 3836)
      • schtasks.exe (PID: 6656)
      • schtasks.exe (PID: 2400)
      • schtasks.exe (PID: 6636)
      • schtasks.exe (PID: 6748)
      • schtasks.exe (PID: 4944)
      • schtasks.exe (PID: 5432)
      • schtasks.exe (PID: 4100)
      • schtasks.exe (PID: 6488)
      • schtasks.exe (PID: 5708)
      • schtasks.exe (PID: 2388)
      • schtasks.exe (PID: 4864)
      • schtasks.exe (PID: 3840)
      • schtasks.exe (PID: 2280)
      • schtasks.exe (PID: 1604)
      • schtasks.exe (PID: 6948)
      • schtasks.exe (PID: 684)
      • schtasks.exe (PID: 2276)
      • schtasks.exe (PID: 7140)
      • schtasks.exe (PID: 3948)
      • schtasks.exe (PID: 4160)
      • schtasks.exe (PID: 2716)
      • schtasks.exe (PID: 6676)
      • schtasks.exe (PID: 6236)
      • schtasks.exe (PID: 7084)
      • schtasks.exe (PID: 4580)
      • schtasks.exe (PID: 2324)
      • schtasks.exe (PID: 4072)
      • schtasks.exe (PID: 2432)
      • schtasks.exe (PID: 4456)
      • schtasks.exe (PID: 1300)
      • schtasks.exe (PID: 1580)
      • schtasks.exe (PID: 1872)
      • schtasks.exe (PID: 4232)
      • schtasks.exe (PID: 1740)
      • schtasks.exe (PID: 5084)
    • Likely accesses (executes) a file from the Public directory

      • schtasks.exe (PID: 2716)
      • schtasks.exe (PID: 4088)
      • schtasks.exe (PID: 3840)
      • schtasks.exe (PID: 4864)
      • schtasks.exe (PID: 4232)
      • schtasks.exe (PID: 2280)
      • schtasks.exe (PID: 2388)
      • schtasks.exe (PID: 1580)
      • schtasks.exe (PID: 5084)
      • schtasks.exe (PID: 7084)
      • schtasks.exe (PID: 4580)
      • schtasks.exe (PID: 1872)
    • The process creates files with name similar to system file names

      • wininit.exe (PID: 6504)
    • Executable content was dropped or overwritten

      • wininit.exe (PID: 6504)
    • Executing commands from a ".bat" file

      • wininit.exe (PID: 6504)
    • Probably delay the execution using 'w32tm.exe'

      • cmd.exe (PID: 2400)
    • Starts CMD.EXE for commands execution

      • wininit.exe (PID: 6504)
    • The executable file from the user directory is run by the CMD process

      • RuntimeBroker.exe (PID: 1592)
    • Reads security settings of Internet Explorer

      • wininit.exe (PID: 6504)
    • Reads the date of Windows installation

      • wininit.exe (PID: 6504)
    • There is functionality for taking screenshot (YARA)

      • RuntimeBroker.exe (PID: 1592)
  • INFO

    • Checks supported languages

      • wininit.exe (PID: 6504)
      • RuntimeBroker.exe (PID: 1592)
    • The sample compiled with english language support

      • wininit.exe (PID: 6504)
    • Reads Environment values

      • wininit.exe (PID: 6504)
      • RuntimeBroker.exe (PID: 1592)
    • Reads the computer name

      • wininit.exe (PID: 6504)
      • RuntimeBroker.exe (PID: 1592)
    • Creates files or folders in the user directory

      • wininit.exe (PID: 6504)
    • Reads the machine GUID from the registry

      • wininit.exe (PID: 6504)
      • RuntimeBroker.exe (PID: 1592)
    • Failed to create an executable file in Windows directory

      • wininit.exe (PID: 6504)
    • Creates files in the program directory

      • wininit.exe (PID: 6504)
    • Process checks computer location settings

      • wininit.exe (PID: 6504)
    • Checks proxy server information

      • RuntimeBroker.exe (PID: 1592)
    • Disables trace logs

      • RuntimeBroker.exe (PID: 1592)
    • Create files in a temporary directory

      • wininit.exe (PID: 6504)
    • Potential dynamic function import (Base64 Encoded 'GetProcAddress')

      • RuntimeBroker.exe (PID: 1592)
    • .NET Reactor protector has been detected

      • RuntimeBroker.exe (PID: 1592)
    • Potential library load (Base64 Encoded 'LoadLibrary')

      • RuntimeBroker.exe (PID: 1592)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

DcRat

(PID) Process(1592) RuntimeBroker.exe
C2 (1)http://co15237.tw1.ru/d7d9201d
Options
MutexDCR_MUTEX-TYo07DrGE4ei87HTLwXP
savebrowsersdatatosinglefilefalse
ignorepartiallyemptydatafalse
cookiestrue
passwordstrue
formstrue
cctrue
historyfalse
telegramtrue
steamtrue
discordtrue
filezillatrue
screenshottrue
clipboardtrue
sysinfotrue
searchpath%UsersFolder% - Fast
Targetals
C2 (1)http://co15237.tw1.ru/d7d9201d
Options
Version4.5.32
SleepTimeout5
ServerTypeC#
MutexDCR_MUTEX-TYo07DrGE4ei87HTLwXP
Debugfalse
ServerConfigReplacementTable
0;
1,
2`
8#
N<
I*
S~
W^
i-
z&
V)
F$
P|
x_
l!
R(
d>
E%
w.
j@
O
PluginConfigReplacementTable
0&
1%
3>
Q,
l#
c^
W<
M!
B|
n`
U-
D)
H_
J;
v@
Z
m*
h.
N~
F(
V$
GetWebcamsfalse
InactivityTimeout2
CacheStorageRegistry
AutoRunSmart
StealerConfig
savebrowsersdatatosinglefilefalse
ignorepartiallyemptydatafalse
cookiestrue
passwordstrue
formstrue
cctrue
historyfalse
telegramtrue
steamtrue
discordtrue
filezillatrue
screenshottrue
clipboardtrue
sysinfotrue
searchpath%UsersFolder% - Fast
StealerEnabledfalse
StealerOptionsfalse
SelfDeletefalse
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (45.1)
.exe | Win32 Executable MS Visual C++ (generic) (19.2)
.exe | Win64 Executable (generic) (17)
.scr | Windows screen saver (8)
.dll | Win32 Dynamic Link Library (generic) (4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:04 16:03:35+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 1162240
InitializedDataSize: 13824
UninitializedDataSize: -
EntryPoint: 0x11da3e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.15.2.0
ProductVersionNumber: 5.15.2.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileVersion: 5.15.2.0
OriginalFileName: libGLESv2.dll
ProductName: libGLESv2
ProductVersion: 5.15.2.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
191
Monitored processes
58
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wininit.exe schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs w32tm.exe no specs #DCRAT runtimebroker.exe slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
684schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Users\admin\Cookies\explorer.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1160w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 C:\Windows\System32\w32tm.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Time Service Diagnostic Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\w32tm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
1216schtasks.exe /create /tn "StartMenuExperienceHost" /sc ONLOGON /tr "'C:\Users\Default\Favorites\StartMenuExperienceHost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1300schtasks.exe /create /tn "dasHostd" /sc MINUTE /mo 8 /tr "'C:\Users\All Users\PLUG\Logs\dasHost.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1580schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Users\Public\spoolsv.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1592"C:\Users\admin\Templates\RuntimeBroker.exe" C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\RuntimeBroker.exe
cmd.exe
User:
admin
Integrity Level:
MEDIUM
Version:
5.15.2.0
Modules
Images
c:\users\admin\appdata\roaming\microsoft\windows\templates\runtimebroker.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
DcRat
(PID) Process(1592) RuntimeBroker.exe
C2 (1)http://co15237.tw1.ru/d7d9201d
Options
MutexDCR_MUTEX-TYo07DrGE4ei87HTLwXP
savebrowsersdatatosinglefilefalse
ignorepartiallyemptydatafalse
cookiestrue
passwordstrue
formstrue
cctrue
historyfalse
telegramtrue
steamtrue
discordtrue
filezillatrue
screenshottrue
clipboardtrue
sysinfotrue
searchpath%UsersFolder% - Fast
Targetals
(PID) Process(1592) RuntimeBroker.exe
C2 (1)http://co15237.tw1.ru/d7d9201d
Options
Version4.5.32
SleepTimeout5
ServerTypeC#
MutexDCR_MUTEX-TYo07DrGE4ei87HTLwXP
Debugfalse
ServerConfigReplacementTable
0;
1,
2`
8#
N<
I*
S~
W^
i-
z&
V)
F$
P|
x_
l!
R(
d>
E%
w.
j@
O
PluginConfigReplacementTable
0&
1%
3>
Q,
l#
c^
W<
M!
B|
n`
U-
D)
H_
J;
v@
Z
m*
h.
N~
F(
V$
GetWebcamsfalse
InactivityTimeout2
CacheStorageRegistry
AutoRunSmart
StealerConfig
savebrowsersdatatosinglefilefalse
ignorepartiallyemptydatafalse
cookiestrue
passwordstrue
formstrue
cctrue
historyfalse
telegramtrue
steamtrue
discordtrue
filezillatrue
screenshottrue
clipboardtrue
sysinfotrue
searchpath%UsersFolder% - Fast
StealerEnabledfalse
StealerOptionsfalse
SelfDeletefalse
1604schtasks.exe /create /tn "explorere" /sc MINUTE /mo 11 /tr "'C:\Users\admin\Cookies\explorer.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1740schtasks.exe /create /tn "StartMenuExperienceHostS" /sc MINUTE /mo 9 /tr "'C:\Users\Default\Favorites\StartMenuExperienceHost.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1740schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Users\admin\Templates\RuntimeBroker.exe'" /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1872schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 6 /tr "'C:\Users\Public\spoolsv.exe'" /rl HIGHEST /fC:\Windows\System32\schtasks.exeWmiPrvSE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Task Scheduler Configuration Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 353
Read events
4 352
Write events
1
Delete events
0

Modification events

(PID) Process:(6504) wininit.exeKey:HKEY_CURRENT_USER\SOFTWARE\d139ed5051f6e32cf753602a8ef0af9e7fd2cedc
Operation:writeName:497084ae4829c91b207b12af4c77ec5c46a57c50
Value:
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
Executable files
16
Suspicious files
0
Text files
18
Unknown types
0

Dropped files

PID
Process
Filename
Type
6504wininit.exeC:\Users\Default\Music\slui.exeexecutable
MD5:B1E117B780C2AFB3DA1571FBB20A3546
SHA256:06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996
6504wininit.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\9e8d7a4ca61bd9text
MD5:5F3F40D0D51D48237B4FE630D5E8DF1D
SHA256:E022F75CB9A6F3FD581769D92D8F808343F6CC0929AC3434667AD6727723B4D7
6504wininit.exeC:\Users\admin\AppData\Local\csrss.exeexecutable
MD5:B1E117B780C2AFB3DA1571FBB20A3546
SHA256:06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996
6504wininit.exeC:\ProgramData\uhssvc.exeexecutable
MD5:B1E117B780C2AFB3DA1571FBB20A3546
SHA256:06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996
6504wininit.exeC:\Users\Default\Pictures\9e8d7a4ca61bd9text
MD5:4059050784A2ED5198E8300353B3BF36
SHA256:48170A22B6364EEA2BCDE08CCCC4C7368436B6650BF775982778595D8CC08517
6504wininit.exeC:\ProgramData\105eec298f1910text
MD5:1A43262C8957695B9ABA15AC9EB7CAA9
SHA256:B1A1C821A968DC83AFFB6270D8AB234180B1CB6B25EF62DAAEB127D3E0450A86
6504wininit.exeC:\Users\admin\ea1d8f6d871115text
MD5:32FFE7CE7D523A6C86E455844B5946FD
SHA256:8BF6F97C5DF831532B95749FDE7004DEF6D0F724C205613138750BCFE16B155E
6504wininit.exeC:\Users\admin\Links\System.exeexecutable
MD5:B1E117B780C2AFB3DA1571FBB20A3546
SHA256:06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996
6504wininit.exeC:\Users\Public\AccountPictures\RuntimeBroker.exeexecutable
MD5:B1E117B780C2AFB3DA1571FBB20A3546
SHA256:06E0261F2CF9396491DA0D8E9A406596C25613C60C9E7A6E95E3FA240F1FC996
6504wininit.exeC:\Users\Default\Favorites\55b276f4edf653text
MD5:20321DC9BB59BF3B43A3BC949AE2FA67
SHA256:C3F8831934A46971F6929BF2BAA637B6DB59EBBDE264B7A53CDBF07DC0E1353B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
74
TCP/UDP connections
25
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4168
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.6:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?sTrFTRqZDztX0fHbeMak=2YN62HwJUDUrWBD&llC84z6ITlPKIpTsULz5eI=J4QtvYpddDv2kXm&DcEnQ2lAoulWLMILc=3EnGKt&a41770ed9a58ff51447b1057cc634125=56ce7d809faf323907f3bb9777613412&c36f9de3511a8257cd933876d189168f=QY3IzMyYGZxMTNidTOzUTNmhTNyM2N4EWNyIDOiZmNiFTOkRTO2YWN&sTrFTRqZDztX0fHbeMak=2YN62HwJUDUrWBD&llC84z6ITlPKIpTsULz5eI=J4QtvYpddDv2kXm&DcEnQ2lAoulWLMILc=3EnGKt
unknown
malicious
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&4e74d26fc6777bd179e281e775310ee8=0VfiIiOiEzNihzM3YDZxATM1UGZ5ITZkhDN3IWZ2IDZ2YDN5kTNiwiIwETZzMjZ4IzY2gTO0EjMzADZ0I2MzUDZmN2NyUjM0cTOjlDNzkTZyIiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&6be2afa5ad31d5af35ab0bbe7b78818b=d1nI4YjM1cjZzEGZiVmZ4kTM0EmMzYjY3MDNjZGZkdTMyE2MkJjN0YWMwIiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W&4e74d26fc6777bd179e281e775310ee8=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
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&cfb7fc81587918fc5a749350c91aff57=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
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&6be2afa5ad31d5af35ab0bbe7b78818b=d1nI4YjM1cjZzEGZiVmZ4kTM0EmMzYjY3MDNjZGZkdTMyE2MkJjN0YWMwIiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W&4e74d26fc6777bd179e281e775310ee8=QX9JiI6ISM3IGOzcjNkFDMxUTZkljMlRGO0cjYlZjMkZjN0kTO1ICLigjNyUzNmNTYkJWZmhTOxQTYyMjNidzM0MmZkR2NxITYzQmM2QjZxAjI6ICOxUTM3ADO3gzNhFTNzkjZwQ2N5cDN0cjZzADZ1M2M1ICLiImZiRTMzUTO1E2M0QWOmJmY1EWOhhDNjlTY1cjYkhDM5UDO5UzNyYmI6ICNyEWNlVTN3QTYidjYkF2NjRTO5I2N1MDO2kDM1M2M3Iyes0nIwglZp1EWidWVq5UavpWS0cGVOlmWt1EMNpWWqZ1VNNTSy0UeRdkWyUkMZtmRq5EbSJjTsJVbalmTt5EbCpnTtJlaZtmS5VmNJNVWwY0RSBDaYpVa3NlT2k0QkFTOXpFdsdkV3Z1VaNnTsl0cJNlWyw2RkpmRrlkNJl3YxIFWZBjTWVGMs1GZwJ1MZJkSDxUaJhlWuZUbihWMFlEdG12YulTbjFlSp9UajNjYrVzVhhlUxElQKNETpRzaJZTSTJGaO1WWsRWMjBnSDxUarxWS2k0UaVXOHF2d502Yqx2VUpHbtl0cJN1S1R2MiVHdtJmVoNUS1R2MiVHdtJmVKl2TpV1VihWNVZVUOtWSzl0ULVHZzIWd01mYWh2QJVHZzIWd01mYWpUaPlWVXJGa1UlVRR2aJNXSpRVavpWS1x2VitmRwMGcKNETplUaPl2YVFVVKNETpFFWhNkQD5kMBNlW6xWbjdnSYpFM1clUnFEVNdWTzQmdS1mYwRGbJZTSpNGbaxmYwRGbJNHMulkes12YoJUMMxmQzIWeWhlUp9maJxWNyImNWdlYwJlbJNXSD10dBRUT3FkaJZTSDJGaSNzY2JkbJNXSTpla1cVW5pVRJRXQDpFbs1mWw50VadnTIlEM50GVp9maJ5mSzIWa3lWSwsGROpHNp10cnRlTxcmaMRTUqlkNJlXW2hXbJNXSpV1RKl2TptmbjBTNXRmdO1WSzlUejBnSYlVUKl2TpRjMiBHZXpVeKNETp1EWhlnRHVVavpWS1IFWhpmSDxUaRRlT1lkaNVXRU9UdVRkTp9maJdHbtl0NwpWS2pVbipkQYNVa3lWS1x2VitmRtlkNJNlW0ZUbUlnVyMmVKNETpFVRUtEeFRFSwVFTRlTRWxkTWJVRKl2TpV1VihWNwEVUKNETplkeNVXVqxEMJl2TplEWadlSYplMKhlWUp0QMlWT5FVavpWSsJEWlVlSYplMKhlWUpUelJiOiEzNihzM3YDZxATM1UGZ5ITZkhDN3IWZ2IDZ2YDN5kTNiwiI5EjY4YzYyQGZwYTYlJTOwE2NwIDMzEjNmNjY1U2YycjNhJzNiRmNjJiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&6be2afa5ad31d5af35ab0bbe7b78818b=d1nI4YjM1cjZzEGZiVmZ4kTM0EmMzYjY3MDNjZGZkdTMyE2MkJjN0YWMwIiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W&4e74d26fc6777bd179e281e775310ee8=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
unknown
whitelisted
1592
RuntimeBroker.exe
GET
200
92.53.96.145:80
http://co15237.tw1.ru/d7d9201d.php?nq04EPBkTWnlzMdW8lqOoQMWIVl=0JyNYzWO1IajeYeaLErR9wZUn3L&eevtnJuKhZNAz=ezLHuPvvK&nU2D=djen9tXXr5UoU3v1qcuRkJgJ&b1f980d3ca6ac793b7fc21b94549d2e3=3ATOwUjZwgDNyQmY0MzNwADNxgjN4IDN2EjN0MTN4cjNzEzY1QWY4UzN4MTNxYTNyIzN1YTO&c36f9de3511a8257cd933876d189168f=QO1QjN3kDO2Y2NkFGMlVjY1kjMykTOyYmZ2YzNwETZklDOyEGZjRzM&6be2afa5ad31d5af35ab0bbe7b78818b=d1nI4YjM1cjZzEGZiVmZ4kTM0EmMzYjY3MDNjZGZkdTMyE2MkJjN0YWMwIiOigTM1EzNwgzN4cTYxUzM5YGMkdTO3QDN3Y2MwQWNjNTNiwiIiZmY0EzM1kTNhNDNkljZiJWNhlTY4QzY5EWN3IGZ4ATO1gTO1cjMmJiOiQjMhVTZ1UzN0EmY3IGZhdzY0kTOidTNzgjN5ATNjNzNis3W&4e74d26fc6777bd179e281e775310ee8=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
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1632
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
4168
svchost.exe
40.126.32.138:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4168
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.216.77.6:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
1592
RuntimeBroker.exe
92.53.96.145:80
co15237.tw1.ru
TimeWeb Ltd.
RU
malicious

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.110
whitelisted
login.live.com
  • 40.126.32.138
  • 20.190.160.130
  • 20.190.160.67
  • 20.190.160.64
  • 20.190.160.5
  • 20.190.160.131
  • 40.126.32.134
  • 20.190.160.14
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
crl.microsoft.com
  • 23.216.77.6
  • 23.216.77.28
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
co15237.tw1.ru
  • 92.53.96.145
malicious
slscr.update.microsoft.com
  • 74.178.76.128
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted

Threats

PID
Process
Class
Message
2200
svchost.exe
A Network Trojan was detected
MALWARE [ANY.RUN] Suspected domain Associated with Malware Distribution (.tw1 .ru)
1592
RuntimeBroker.exe
A Network Trojan was detected
ET MALWARE DCRAT Activity (GET)
No debug info