| File name: | Installer.exe |
| Full analysis: | https://app.any.run/tasks/7ac83b76-6baf-43a6-8581-1cf8781d3adc |
| Verdict: | Malicious activity |
| Threats: | Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns. |
| Analysis date: | March 15, 2026, 18:05:04 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections |
| MD5: | E348631A2729A08A9790F2C85BFFC9D9 |
| SHA1: | 6BA2C6DA30A56BF978C0C5EEE532354687C8DBFC |
| SHA256: | 08BBCA1E793987092B0FEE110128E2C380A85BFA736263D4A29DD7F858383158 |
| SSDEEP: | 49152:vjVhXOMJzZjRGN1D1xJY6o4gKTPJSI15oRbCcmLa0MmIzARy0yVrTvd9Dgmq4Sph:L+MJywc0I11cmuXURy0yxZ9DgeYy7u9 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 0000:00:00 00:00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 3 |
| CodeSize: | 648704 |
| InitializedDataSize: | 16384 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x69880 |
| OSVersion: | 6.1 |
| ImageVersion: | 1 |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | nationallyterrorist |
| FileVersion: | 1.0.0.0 |
| InternalName: | offensivecontrollers |
| LegalCopyright: | hungarianafghanistan |
| OriginalFileName: | interested.exe |
| ProductName: | behavioralscholarships |
| ProductVersion: | 1.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 848 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | — | Installer.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 2292 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3112 | "C:\Users\admin\Desktop\Installer.exe" | C:\Users\admin\Desktop\Installer.exe | explorer.exe | ||||||||||||
User: admin Company: nationallyterrorist Integrity Level: MEDIUM Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 3636 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | Installer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 5468 | "C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\LicensingService.exe" "C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\LicensingService.exe.manifest" | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\LicensingService.exe | powershell.exe | ||||||||||||
User: admin Company: Python Software Foundation Integrity Level: MEDIUM Description: Python Version: 3.15.0a6 Modules
| |||||||||||||||
| 5636 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7284 | "C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe" --wake --system | C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Updater Exit code: 0 Version: 134.0.6985.0 Modules
| |||||||||||||||
| 7568 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | Installer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 7584 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8028 | "C:\Program Files\Google\Chrome\Application\chrome.exe" | C:\Program Files\Google\Chrome\Application\chrome.exe | — | Installer.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| (PID) Process: | (9208) powershell.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | Megatronic Develop Triple 47019 |
Value: "C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\LicensingService.exe" "C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\LicensingService.exe.manifest" | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 9208 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_z1epljm5.xe0.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 8352 | updater.exe | C:\Program Files (x86)\Google\GoogleUpdater\updater.log | text | |
MD5:AD60AB60788764CA8AE91C42F099C864 | SHA256:6A0062EF1E223A191A23FAEDA489AB9639979A8621E29289AB097253CC9C576F | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_jgtjjos0.ilg.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\_hashlib.pyd | executable | |
MD5:CBAEAC105368D515A4D1A6940DFBB1DA | SHA256:26E11F41BF2197C007CCB57DC98D939DD409C0C3D8DE77B31E19943F772EE8F8 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\python315.zip | compressed | |
MD5:D6E54E53978B3D55671595687D974681 | SHA256:0E029C316B6BC7931064A1B5DD2F18213A0581BF447FFFBBF687E6CCA573AA21 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\sqlite3.dll | executable | |
MD5:DD46150DB2866C834C57EF43C3D73AD2 | SHA256:87C6B978C344588A467F85B90CC8B08A43F85AF0FBA63F7E8B2ACB020EA32624 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\_ctypes.pyd | executable | |
MD5:4C2B30EA5DDE6369C5E2F757CA4A42C1 | SHA256:3D96BD2FCCEAC4B94AA4C39A2C28117B67FDEF2EFB85E8C70153A42232A993F3 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\unicodedata.pyd | executable | |
MD5:574E55857A21FE3A4A4AFB2EDAB6CA47 | SHA256:AB9887DB8CC2BF76A91E7E17BC59B94A6771C6C4E7223142F352006D8131F9D7 | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\python3.dll | executable | |
MD5:F1C0A4A859622F79C0FA559196B3E693 | SHA256:482B1C87A8BDD8770EC81F4B0E236DE21B5CF3D45A549DC0B051B09732A99DBE | |||
| 9208 | powershell.exe | C:\Users\admin\AppData\Roaming\Intel\Platform\WinRT\a2631c734e58d571\_queue.pyd | executable | |
MD5:14C76669397F108DE22E12F6B1CDE2C8 | SHA256:8175BC5BA1D0A593972DDFEE43DF20C43F8A31A5002D7B9A4709CA3EAFD7E9D7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D | unknown | — | — | whitelisted |
3112 | Installer.exe | POST | 200 | 193.221.201.247:443 | https://microsoft.com/ | unknown | binary | 104 b | whitelisted |
— | — | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D | unknown | — | — | whitelisted |
3112 | Installer.exe | POST | 200 | 193.221.201.247:443 | https://microsoft.com/ | unknown | binary | 359 b | whitelisted |
3112 | Installer.exe | POST | 200 | 193.221.201.247:443 | https://microsoft.com/a_KnH_X9x-JK.v2uB | unknown | binary | 50.2 Kb | whitelisted |
3112 | Installer.exe | POST | 200 | 193.221.201.247:443 | https://microsoft.com/Pau_v.Yr7_~-phLeNCfqOY_wPcV~FPPr@bI_4_tk2z- | unknown | — | — | whitelisted |
356 | svchost.exe | POST | 400 | 20.190.160.2:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
356 | svchost.exe | POST | 200 | 20.190.160.2:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
356 | svchost.exe | POST | 400 | 20.190.160.2:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
6768 | MoUsoCoreWorker.exe | GET | 304 | 51.124.78.146:443 | https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
2600 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8680 | RUXIMICS.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6768 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 2.16.204.155:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
— | — | 2.16.204.158:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
— | — | 204.79.197.203:80 | oneocsp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
— | — | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.bing.com |
| whitelisted |
th.bing.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
oneocsp.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2600 | svchost.exe | Unknown Traffic | ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW) |
2292 | svchost.exe | Misc activity | INFO [ANY.RUN] .pw TLD domain request |
9208 | powershell.exe | Misc activity | ET INFO HTTP Request to a *.pw domain |
2292 | svchost.exe | Potentially Bad Traffic | ET HUNTING File Sharing Related Domain (www .mediafire .com) in DNS Lookup |
2292 | svchost.exe | Potentially Bad Traffic | ET FILE_SHARING File Sharing Related Domain in DNS Lookup (download .mediafire .com) |
2292 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare content delivery network (cdnjs .cloudflare .com) |
5468 | LicensingService.exe | Misc activity | INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET) |
5468 | LicensingService.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 28 |