| File name: | 4363463463464363463463463.exe |
| Full analysis: | https://app.any.run/tasks/b663651e-09d0-4cad-9fb6-0ee801106554 |
| Verdict: | Malicious activity |
| Threats: | ACR Stealer is a modern information-stealing malware designed to harvest sensitive data from infected devices. Like other infostealers, it targets credentials, financial details, browser data, and files, enabling cybercriminals to monetize stolen information through direct fraud or underground market sales. |
| Analysis date: | June 18, 2025, 22:18:37 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections |
| MD5: | 2A94F3960C58C6E70826495F76D00B85 |
| SHA1: | E2A1A5641295F5EBF01A37AC1C170AC0814BB71A |
| SHA256: | 2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE |
| SSDEEP: | 192:2we8sGKE6MqyG7c20L7BIW12n/ePSmzkTInu8stYcFwVc03KY:9e8sGKfMqyGg20PKn/cRaInuptYcFwVY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (82.9) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (7.4) |
| .exe | | | Win32 Executable (generic) (5.1) |
| .exe | | | Generic Win/DOS Executable (2.2) |
| .exe | | | DOS Executable Generic (2.2) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:12:22 08:29:10+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32 |
| LinkerVersion: | 80 |
| CodeSize: | 5632 |
| InitializedDataSize: | 4608 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x3552 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
| FileVersionNumber: | 0.0.0.0 |
| ProductVersionNumber: | 0.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| FileDescription: | |
| FileVersion: | 0.0.0.0 |
| InternalName: | 4363463463464363463463463.exe |
| LegalCopyright: | |
| OriginalFileName: | 4363463463464363463463463.exe |
| ProductVersion: | 0.0.0.0 |
| AssemblyVersion: | 0.0.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 316 | "C:\Users\admin\AppData\Roaming\Java\jusched.exe" | C:\Users\admin\AppData\Roaming\Java\jusched.exe | JUSCHED.EXE | ||||||||||||
User: admin Company: Oracle Integrity Level: HIGH Description: Java Update Scheduler Version: 8.0.202.8 Modules
Quasar(PID) Process(316) jusched.exe Version1.4.1 C2 (2)193.161.193.99:32471 Sub_DirJava Install_Namejusched.exe Mutex807f3187-d087-4fff-beff-e73293a32af8 StartupJava Update Scheduler TagDDNS LogDirCachedLogs SignaturesBocLBRxMUw3To7ZzewZ3YsrO0Z+fc3KsRzMzv9mfbF5sJ1MJ+tSUeK3n4v0qA9CdzuiNoXDrsMLx0lNGdFJEPGAtWXTb1QPmup0gzzxZYzgUjbW3K6OUlQnrnCRJ5B/gVJhvjpeytHJcJXoVVThOCBhfRHkUdKjWvea5McjXDhUWz1Xu7FF9MqOxPols3wY2Arj/mHwFcuAzhnR5Fg27eVVh2bANkzob/YNZrH+PoUvxMthySf1+JI28o0Nzl9a/PDUUuq4nPq78M0M4glGmHqp4kgCf57NRQhEjF8nTyIm... CertificateMIIE9DCCAtygAwIBAgIQAKdj9OEEtK/PmVn/2IlEdTANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTI0MTExMjA2MTQxN1oYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAt79yvi82zMkZkRdUuCBbnaQ9a7fqidLALKNd/BEjRKS1OWiYAzTf9ZzAK1K+kOAeePTlezhU... | |||||||||||||||
| 436 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | schtasks.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 756 | "C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\Desktop\Files\update.exe" | C:\Users\admin\AppData\Roaming\Axam.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 1.00 Modules
| |||||||||||||||
| 856 | C:\WINDOWS\system32\cmd.exe /c "netsh wlan show profiles" | C:\Windows\System32\cmd.exe | — | main.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 984 | "schtasks" /create /tn "Windows_Host_Process" /sc ONLOGON /tr "C:\Users\admin\AppData\Roaming\RealTekAudio\bootstrapper.exe" /rl HIGHEST /f | C:\Windows\System32\schtasks.exe | — | bootstrapper.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Task Scheduler Configuration Tool Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1056 | "C:\Users\admin\AppData\Roaming\Axam.exe" "C:\Users\admin\Desktop\Files\testingfile.exe" | C:\Users\admin\AppData\Roaming\Axam.exe | 4363463463464363463463463.exe | ||||||||||||
User: admin Integrity Level: HIGH Version: 1.00 Modules
| |||||||||||||||
| 1200 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1332 | "C:\Users\admin\Desktop\4363463463464363463463463.exe" | C:\Users\admin\Desktop\4363463463464363463463463.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 3221226540 Version: 0.0.0.0 Modules
| |||||||||||||||
| 1352 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4708) 4363463463464363463463463.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\4363463463464363463463463_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4708 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\02.08.2022.exe | binary | |
MD5:AF19B7B4291A9435B2D988080EB6EE9A | SHA256:FE687946C591BAE5737974781917BFA830C80CFFE7BC66096467CAF723D67BFD | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\zlrlltrpsnmvqiqp.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 6344 | %D0%A4%D0%BE%D1%80%D0%BC%D0%B0%203%D0%9E%D0%A8%D0%91%D0%A0.exe | C:\Users\admin\AppData\Local\Temp\server.exe | executable | |
MD5:62635B35D2243003A86FCE6B46CB49CD | SHA256:A448DD8EBF27D88D26C09399271861D99E3A7D8B83D9FB45E168DAF2CB946352 | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\xhufevliuygzuveyi.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\khzbzyrbhltyjmx.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\PCHunter64as.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\nzzwzpfahopopm.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\ufcmqqbvtxwkjok.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 3676 | PCHunter64.exe | C:\Users\admin\Desktop\Files\humnbvkpeeasbtbfp.sys | executable | |
MD5:5EB2F44651D3E4B90664BAB3070409FF | SHA256:32726FA33BE861472D0B26286073B49500E3FD3BD1395F63BC114746A9195EFB | |||
| 4708 | 4363463463464363463463463.exe | C:\Users\admin\Desktop\Files\ayin.v0.1.0.exe | html | |
MD5:0CF72BFA1685C6107ABF842EBDAAC65B | SHA256:A01281DCCCBA3266C5E31B6DA5CBF85042842ACA2A319869B208B9601A27F575 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
4708 | 4363463463464363463463463.exe | GET | 200 | 47.122.20.70:9090 | http://47.122.20.70:9090/02.08.2022.exe | unknown | — | — | unknown |
2288 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4708 | 4363463463464363463463463.exe | GET | 200 | 111.231.145.137:8888 | http://111.231.145.137:8888/supershell/compile/download/3=====.exe | unknown | — | — | malicious |
1268 | svchost.exe | GET | 200 | 23.55.104.172:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4708 | 4363463463464363463463463.exe | GET | 200 | 211.204.100.20:1234 | http://211.204.100.20:1234/NdisInstaller3.2.32.1.exe | unknown | — | — | unknown |
1932 | 4363463463464363463463463.exe | GET | 301 | 140.82.121.3:80 | http://github.com/ronaldorsantana/ronaldo/raw/refs/heads/main/boleto.exe | unknown | — | — | whitelisted |
7964 | esp32.exe | GET | 200 | 4.233.216.36:8000 | http://4.233.216.36:8000/status | unknown | — | — | unknown |
7664 | 4363463463464363463463463.exe | GET | 200 | 211.159.155.136:8888 | http://211.159.155.136:8888/WxWorkMultiOpen.exe | unknown | — | — | unknown |
5328 | SearchApp.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3956 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4708 | 4363463463464363463463463.exe | 151.101.194.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4708 | 4363463463464363463463463.exe | 47.122.20.70:9090 | — | Hangzhou Alibaba Advertising Co.,Ltd. | CN | unknown |
4708 | 4363463463464363463463463.exe | 111.231.145.137:8888 | — | Shenzhen Tencent Computer Systems Company Limited | CN | malicious |
2336 | svchost.exe | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
2288 | svchost.exe | 40.126.31.69:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
hdgreen.org |
| unknown |
raw.githubusercontent.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
4708 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
4708 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
4708 | 4363463463464363463463463.exe | Malware Command and Control Activity Detected | ET MALWARE Supershell CnC Activity |
4708 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
4708 | 4363463463464363463463463.exe | Potential Corporate Privacy Violation | ET INFO PE EXE or DLL Windows file download HTTP |
4708 | 4363463463464363463463463.exe | Misc activity | ET INFO EXE - Served Attached HTTP |
4708 | 4363463463464363463463463.exe | Potentially Bad Traffic | ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response |
4708 | 4363463463464363463463463.exe | Misc activity | ET INFO Packed Executable Download |
2200 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
5620 | 3=====.exe | Potential Corporate Privacy Violation | POLICY [ANY.RUN] A SSH banner has been detected on a non-standard port number |
Process | Message |
|---|---|
4363463463464363463463463.exe | The specified executable is not a valid application for this OS platform.
|
4363463463464363463463463.exe | The file or directory is corrupted and unreadable
|
CritScript.exe | C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE |
CritScript.exe | C:\Users\admin\AppData\Local\Temp\ZOMBIES.AHK |
3e3ev3.exe | CLR: Managed code called FailFast without specifying a reason.
|
4363463463464363463463463.exe | The file or directory is corrupted and unreadable
|
4363463463464363463463463.exe | The file or directory is corrupted and unreadable
|
dfsvc.exe |
*** Status originated: -1073741811
*** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
|
dfsvc.exe |
*** Status originated: -1073741811
*** Source File: onecore\com\netfx\windowsbuilt\iso_legacy\base\isolation\hier_hierarchy.cpp, line 230
|
4363463463464363463463463.exe | An exception occurred during a WebClient request.
|