File name:

GenP-v3.6.9.exe

Full analysis: https://app.any.run/tasks/848d98c2-edd6-4137-abcb-2ca1ee619f89
Verdict: Malicious activity
Analysis date: September 17, 2025, 23:40:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 7 sections
MD5:

6656CF79748C1C41D03768784EA8A410

SHA1:

91B86A52CB1AA7E1797F9A0E2C440C8ACBCC4D40

SHA256:

2758962D7D7F998C817A24D343C7DE9374474A00B2016F15542FC727D5E0C90C

SSDEEP:

98304:DEng3KEZdwoB6imokHlR7rkVtOKYYCTOQLvYq8y68hsmah+Zi2Zv10AOR:DK

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Creates file in the systems drive root

      • GenP-v3.6.9.exe (PID: 3576)
    • Reads security settings of Internet Explorer

      • GenP-v3.6.9.exe (PID: 3576)
    • There is functionality for taking screenshot (YARA)

      • GenP-v3.6.9.exe (PID: 3576)
  • INFO

    • Reads mouse settings

      • GenP-v3.6.9.exe (PID: 3576)
    • The sample compiled with english language support

      • GenP-v3.6.9.exe (PID: 3576)
    • Create files in a temporary directory

      • GenP-v3.6.9.exe (PID: 3576)
    • Checks supported languages

      • GenP-v3.6.9.exe (PID: 3576)
    • Creates files in the program directory

      • GenP-v3.6.9.exe (PID: 3576)
    • The process uses AutoIt

      • GenP-v3.6.9.exe (PID: 3576)
    • Reads the machine GUID from the registry

      • GenP-v3.6.9.exe (PID: 3576)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.3)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:09:17 23:23:50+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.44
CodeSize: 757760
InitializedDataSize: 1384960
UninitializedDataSize: -
EntryPoint: 0x24218
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
FileVersionNumber: 3.6.9.0
ProductVersionNumber: 3.6.9.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: English (British)
CharacterSet: Unicode
FileVersion: 3.6.9.0
Comments: GenP
FileDescription: GenP
ProductName: GenP
ProductVersion: 3.6.9
CompanyName: GenP
LegalCopyright: GenP 2025
LegalTradeMarks: GenP 2025
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start genp-v3.6.9.exe slui.exe no specs genp-v3.6.9.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3504"C:\Users\admin\AppData\Local\Temp\GenP-v3.6.9.exe" C:\Users\admin\AppData\Local\Temp\GenP-v3.6.9.exeexplorer.exe
User:
admin
Company:
GenP
Integrity Level:
MEDIUM
Description:
GenP
Exit code:
3221226540
Version:
3.6.9.0
Modules
Images
c:\users\admin\appdata\local\temp\genp-v3.6.9.exe
c:\windows\system32\ntdll.dll
3576"C:\Users\admin\AppData\Local\Temp\GenP-v3.6.9.exe" C:\Users\admin\AppData\Local\Temp\GenP-v3.6.9.exe
explorer.exe
User:
admin
Company:
GenP
Integrity Level:
HIGH
Description:
GenP
Exit code:
0
Version:
3.6.9.0
Modules
Images
c:\users\admin\appdata\local\temp\genp-v3.6.9.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\psapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
3740C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 235
Read events
3 198
Write events
35
Delete events
2

Modification events

(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
02020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:MRUListEx
Value:
040000000000000003000000110000000E000000100000000F0000000C0000000D0000000B000000050000000A000000090000000800000001000000070000000600000002000000FFFFFFFF
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0
Operation:writeName:MRUListEx
Value:
0500000006000000040000000100000008000000020000000C0000000B0000000A00000009000000070000000000000003000000FFFFFFFF
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\5
Operation:writeName:6
Value:
50003100000000004658D068100041646F6265003C0009000400EFBE4658D068315B08BD2E000000E46100000000200000000000000000000000000000004AE5D900410064006F0062006500000014000000
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\5\6
Operation:delete valueName:MRUList
Value:
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\5
Operation:writeName:MRUListEx
Value:
06000000050000000400000003000000010000000200000000000000FFFFFFFF
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
Operation:writeName:NodeSlots
Value:
0202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202020202
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\5\6
Operation:writeName:NodeSlot
Value:
257
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\4\0\5\6
Operation:writeName:MRUListEx
Value:
FFFFFFFF
(PID) Process:(3576) GenP-v3.6.9.exeKey:HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\Shell\Bags\257\Shell
Operation:writeName:SniffedFolderType
Value:
Generic
Executable files
1
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3576GenP-v3.6.9.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.dll.bak
MD5:
SHA256:
3576GenP-v3.6.9.exeC:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.dll
MD5:
SHA256:
3576GenP-v3.6.9.exeC:\Users\admin\AppData\Local\Temp\autCD1F.tmpbinary
MD5:0B0E669D998BF5E904CED83B945451B8
SHA256:A3752F2CB809EBD574A2EFDB46BF84FC2BA63723C8C14ED7B9E71CDF74F71A01
3576GenP-v3.6.9.exeC:\Users\admin\AppData\Local\Temp\config.initext
MD5:7AD508E8AC39165EF9DD495A2100E00A
SHA256:13C37C44BF03B61806EEC40A696155DCAD85D3180C831F7E76F6B89BDEDE62D6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
11
TCP/UDP connections
21
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6540
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
104.79.89.142:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.48.23.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.48.23.24:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
2808
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2040
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6540
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6540
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
23.48.23.24:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
104.79.89.142:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 40.127.240.158
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.206
whitelisted
login.live.com
  • 20.190.160.65
  • 20.190.160.64
  • 40.126.32.68
  • 20.190.160.130
  • 20.190.160.5
  • 20.190.160.22
  • 20.190.160.66
  • 20.190.160.17
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.48.23.24
  • 23.48.23.11
  • 23.48.23.10
  • 23.48.23.35
whitelisted
www.microsoft.com
  • 104.79.89.142
  • 23.3.109.244
whitelisted
slscr.update.microsoft.com
  • 20.165.94.63
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted
self.events.data.microsoft.com
  • 20.42.73.28
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info