File name:

HWiNFO64.exe

Full analysis: https://app.any.run/tasks/05ace31b-1037-4e65-b484-66c1937548b8
Verdict: Malicious activity
Analysis date: March 07, 2025, 04:57:43
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
hwinfo
tool
upx
antivm
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 3 sections
MD5:

70CB4F898C054CB67C809F6A1623FC7D

SHA1:

EDD32DBCC5A38743FF93F1AD0AA2FA1CFAC22D46

SHA256:

136AF1C5097D2BD04E1195C929124CE8545D16170D7B6E7AE6F13FEB61E3C0AE

SSDEEP:

98304:ojjt1JJNSYAlYsIVJ4i4NXQAJAKhjeeeI6hqPIb1KniD2FN8IMZP2K18NyGb7ocY:g89bOivmlX

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HWiNFO64.exe (PID: 7156)
    • Drops a system driver (possible attempt to evade defenses)

      • HWiNFO64.exe (PID: 7156)
    • The process checks if it is being run in the virtual environment

      • HWiNFO64.exe (PID: 7156)
    • Reads the BIOS version

      • HWiNFO64.exe (PID: 7156)
    • Reads security settings of Internet Explorer

      • HWiNFO64.exe (PID: 7156)
    • There is functionality for VM detection antiVM strings (YARA)

      • HWiNFO64.exe (PID: 7156)
  • INFO

    • The sample compiled with english language support

      • HWiNFO64.exe (PID: 7156)
    • HWINFO mutex has been found

      • HWiNFO64.exe (PID: 7156)
    • Reads the computer name

      • HWiNFO64.exe (PID: 7156)
    • Checks supported languages

      • HWiNFO64.exe (PID: 7156)
    • Create files in a temporary directory

      • HWiNFO64.exe (PID: 7156)
    • Reads CPU info

      • HWiNFO64.exe (PID: 7156)
    • Checks proxy server information

      • HWiNFO64.exe (PID: 7156)
      • slui.exe (PID: 3096)
    • Reads the software policy settings

      • HWiNFO64.exe (PID: 7156)
      • slui.exe (PID: 3096)
    • Reads the machine GUID from the registry

      • HWiNFO64.exe (PID: 7156)
    • UPX packer has been detected

      • HWiNFO64.exe (PID: 7156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (47)
.exe | UPX compressed Win32 Executable (46.1)
.exe | Generic Win/DOS Executable (3.4)
.exe | DOS Executable Generic (3.4)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:02:26 08:44:34+00:00
ImageFileCharacteristics: No relocs, Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.29
CodeSize: 9465856
InitializedDataSize: 114688
UninitializedDataSize: 19288064
EntryPoint: 0x1b6bd60
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 8.22.5670.0
ProductVersionNumber: 8.22.5670.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: REALiX s.r.o.
FileVersion: 8.22-5670
ProductVersion: 8.22-5670
LegalCopyright: Copyright (c)1999-2025 Martin Malik, REALiX s.r.o.
InternalName: HWiNFO® 64
FileDescription: HWiNFO® 64 (x64)
OriginalFileName: HWiNFO64.EXE
ProductName: Hardware Info Program for x64 (HWiNFO® 64)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hwinfo64.exe slui.exe hwinfo64.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3096C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5332"C:\Users\admin\Desktop\HWiNFO64.exe" C:\Users\admin\Desktop\HWiNFO64.exeexplorer.exe
User:
admin
Company:
REALiX s.r.o.
Integrity Level:
MEDIUM
Description:
HWiNFO® 64 (x64)
Exit code:
3221226540
Version:
8.22-5670
Modules
Images
c:\users\admin\desktop\hwinfo64.exe
c:\windows\system32\ntdll.dll
7156"C:\Users\admin\Desktop\HWiNFO64.exe" C:\Users\admin\Desktop\HWiNFO64.exe
explorer.exe
User:
admin
Company:
REALiX s.r.o.
Integrity Level:
HIGH
Description:
HWiNFO® 64 (x64)
Version:
8.22-5670
Modules
Images
c:\users\admin\desktop\hwinfo64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
8 311
Read events
8 311
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
5
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7156HWiNFO64.exeC:\Users\admin\AppData\Local\Temp\HWiNFO_x64_204.sysexecutable
MD5:3E7E10631FC581DBB9C5F97793F07F15
SHA256:F79C9CCF61C35B7DDAE2D68BF74DEDCD87364430E76CA4E9955B8E5F606EEE51
7156HWiNFO64.exeC:\Windows\INF\basicdisplay.PNFbinary
MD5:914DCB989709A0CE3F4B24A4CD147F1A
SHA256:C2FEE0EAD23C7B3B509FDDE94DDD6A549F999F364C5CA9D09AC084F22BC0ECB4
7156HWiNFO64.exeC:\Windows\INF\machine.PNFbinary
MD5:4C103190BC521FF032845C1B5FDADC4F
SHA256:28C1DEE803488C32BF5229B05FB3F6DA8959A436BB17D331E68AFA61A3BE932F
7156HWiNFO64.exeC:\Windows\INF\wvid.PNFbinary
MD5:001A053A392EF45B9336D4CF9748BE29
SHA256:258ED93549F63B9A368086660F32A95DF07E7603ED01BA8722EE8C1DA27789C2
7156HWiNFO64.exeC:\Users\admin\Desktop\HWiNFO64.INItext
MD5:31EA0D720B02F5BE9A0A8C843FA525B6
SHA256:2B52116A161DB87EAD7FBA5329E113610A39EC5183D713A9D9A7222FE657C949
7156HWiNFO64.exeC:\Windows\INF\display.PNFbinary
MD5:62887E3F2C67C748F05C629DB62182A4
SHA256:1B686CFC6E98A6034A28BA9BE22C190723467365477E75A18A78104A26554CE9
7156HWiNFO64.exeC:\Windows\INF\basicrender.PNFbinary
MD5:8567F128605CC616A38D0870D077D165
SHA256:7B2D28D317F49EED7BC242241E54EB3FFFB512C5FB6F719C4F5E9395E6B1F533
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
20
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
40.91.76.224:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
2104
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5024
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:138
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7156
HWiNFO64.exe
104.21.22.164:443
www.hwinfo.com
CLOUDFLARENET
whitelisted
6324
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3096
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 142.250.184.206
whitelisted
www.hwinfo.com
  • 104.21.22.164
  • 172.67.205.235
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info