| File name: | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.exe |
| Full analysis: | https://app.any.run/tasks/9cbc545a-84b4-4cd3-9973-b0da8e68e2a1 |
| Verdict: | Malicious activity |
| Analysis date: | March 20, 2026, 14:31:11 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 10 sections |
| MD5: | D653BCF60CC2ACA6FD449605D8748ADF |
| SHA1: | FBA46B043033A5D222414067AA951D419654DEB1 |
| SHA256: | 2D9435152CC275327C6F84832D4A3468CE677879CC350338F12296C276BB4227 |
| SSDEEP: | 196608:S++rmY4D70X9UzlBuWs854+uUWEznFo+FBEK8NfUd7Y:S+zDX0tUJoWs+usemEMJY |
| .exe | | | Inno Setup installer (65.1) |
|---|---|---|
| .exe | | | Win32 EXE PECompact compressed (generic) (24.6) |
| .dll | | | Win32 Dynamic Link Library (generic) (3.9) |
| .exe | | | Win32 Executable (generic) (2.6) |
| .exe | | | Win16/32 Executable Delphi generic (1.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2020:05:21 05:56:23+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 741376 |
| InitializedDataSize: | 72192 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xb5eec |
| OSVersion: | 6 |
| ImageVersion: | 6 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | |
| FileDescription: | |
| FileVersion: | |
| LegalCopyright: | |
| OriginalFileName: | |
| ProductName: | VCZf.exe |
| ProductVersion: | 15.64.335.115 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1312 | C:\WINDOWS\system32\OptionalFeatures.exe | C:\Windows\System32\OptionalFeatures.exe | tSZuRR.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Features Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1832 | schtasks.exe /delete /tn "6SGZ_SYnikRFES3Mp" /f | C:\Windows\System32\schtasks.exe | — | elevation_service.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Task Scheduler Configuration Tool Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2268 | "C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe" | C:\Program Files\Google\Chrome\Application\133.0.6943.127\elevation_service.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Google LLC Integrity Level: SYSTEM Description: Google Chrome Version: 133.0.6943.127 Modules
| |||||||||||||||
| 4272 | "C:\WINDOWS\system32\cmd.exe" /C copy /b "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.1" + "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.2" + "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.3" + "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.4" + "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.5" "C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\XNGj.a.merge_tmp" | C:\Windows\SysWOW64\cmd.exe | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4384 | powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | tSZuRR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4412 | sihost.exe | C:\Windows\System32\sihost.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Shell Infrastructure Host Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4504 | C:\WINDOWS\system32\wlrmdr.exe | C:\Windows\System32\wlrmdr.exe | — | tSZuRR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows logon reminder Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4624 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5264 | "C:\Users\admin\AppData\Local\Temp\is-33400.tmp\_2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp" /SL5="$90302,20145377,814592,C:\Users\admin\Desktop\_2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.exe" | C:\Users\admin\AppData\Local\Temp\is-33400.tmp\_2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.exe | ||||||||||||
User: admin Company: Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| (PID) Process: | (4624) slui.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\3d\52C64B7E |
| Operation: | write | Name: | @%SystemRoot%\System32\sppcomapi.dll,-3200 |
Value: Software Licensing | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\is-HE951.tmp | binary | |
MD5:1931BE5C2B6B8AB424805B1A2FB9F95D | SHA256:FE595F2750A55895A2827479014C780FBA176FE5F74A6695705A572F81269E95 | |||
| 6556 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.exe | C:\Users\admin\AppData\Local\Temp\is-33400.tmp\_2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | executable | |
MD5:E868A2352192C02E4391CEC4E7E51551 | SHA256:CBAC6E991D5CFD07AE85C6BF1D6FF77CDCD0594F8C530D2F69E5C6A0C9451C8C | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\AppData\Local\Temp\is-HE1UK.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\is-0UR35.tmp | executable | |
MD5:39F24264DE1CB6E86E96F6798112DF01 | SHA256:E9F5AA166836C466FFBFFDA8A5B04AA7EFE98CFBE09FD8187B682476DB81A616 | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\tSZuRR.exe.2 | binary | |
MD5:F606378CBA13FB758142364CED089F7A | SHA256:9BF54C2D445ADE1A0FE92D873BB35FE450577CB043354F9307C5D4EA560562A3 | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\is-91SDV.tmp | binary | |
MD5:0BB7BADCD839352FFDBA25B6451766DB | SHA256:23F3609B5C891031AD25F8E71D1286C05A69F10994CEB790796FB2AF13B1435E | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\lDF2TJd.iId.3 | binary | |
MD5:0BB7BADCD839352FFDBA25B6451766DB | SHA256:23F3609B5C891031AD25F8E71D1286C05A69F10994CEB790796FB2AF13B1435E | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\tSZuRR.exe.1 | executable | |
MD5:39F24264DE1CB6E86E96F6798112DF01 | SHA256:E9F5AA166836C466FFBFFDA8A5B04AA7EFE98CFBE09FD8187B682476DB81A616 | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\is-7GGS9.tmp | binary | |
MD5:F606378CBA13FB758142364CED089F7A | SHA256:9BF54C2D445ADE1A0FE92D873BB35FE450577CB043354F9307C5D4EA560562A3 | |||
| 5264 | _2d9435152cc275327c6f84832d4a3468ce677879cc350338f12296c276bb4227.tmp | C:\Users\admin\Documents\BG0Hf\ilpW\MMIHSH\is-HUNK3.tmp | binary | |
MD5:16B92B50996D218FF9A1EBD9EDBDA2DE | SHA256:CF2552512581307C51745D89BF651029CB02B9ADE6FCC097F2269F366E727E58 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4624 | slui.exe | POST | 502 | 48.192.1.64:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | html | 205 b | whitelisted |
4624 | slui.exe | POST | — | 48.192.1.65:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | — | — | whitelisted |
3312 | OfficeClickToRun.exe | POST | — | 52.182.141.63:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | US | — | — | whitelisted |
3312 | OfficeClickToRun.exe | POST | — | 52.182.141.63:443 | https://self.events.data.microsoft.com/OneCollector/1.0/ | US | — | — | whitelisted |
3280 | svchost.exe | GET | — | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Time-Stamp%20PCA%202010(1).crl | US | — | — | whitelisted |
3280 | svchost.exe | GET | — | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.3.crl | US | — | — | whitelisted |
3280 | svchost.exe | GET | — | 23.216.77.8:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | NL | — | — | whitelisted |
3280 | svchost.exe | GET | — | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | US | — | — | whitelisted |
3280 | svchost.exe | GET | — | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | US | — | — | whitelisted |
3280 | svchost.exe | GET | — | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.3.crl | US | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8040 | slui.exe | 48.192.1.64:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
8000 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5276 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4624 | slui.exe | 48.192.1.64:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5208 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4412 | sihost.exe | 156.239.14.174:22 | tl5.mugen888.com | CCSB-AS-AP CORENET CLOUD SDN. BHD. | MY | unknown |
4412 | sihost.exe | 156.239.14.174:80 | tl5.mugen888.com | CCSB-AS-AP CORENET CLOUD SDN. BHD. | MY | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
tl5.mugen888.com |
| unknown |
self.events.data.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4412 | sihost.exe | Attempted Information Leak | ET SCAN Potential SSH Scan OUTBOUND |
4412 | sihost.exe | Attempted Information Leak | ET SCAN Potential SSH Scan OUTBOUND |
4412 | sihost.exe | Attempted Information Leak | ET SCAN Potential SSH Scan OUTBOUND |
4412 | sihost.exe | Attempted Information Leak | ET SCAN Potential SSH Scan OUTBOUND |
4412 | sihost.exe | Attempted Information Leak | ET SCAN Potential SSH Scan OUTBOUND |