File name:

3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a

Full analysis: https://app.any.run/tasks/67dc151f-af4b-4ed5-8b78-5725011a7439
Verdict: Malicious activity
Analysis date: August 01, 2025, 02:10:02
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

155422526C81FAF880EC711B7044EF44

SHA1:

67B6A590E3AAC3CCA79D849EF1AC9F51F4E6702B

SHA256:

3BF4932E6121846F3303818932219F7984AC60196B65E4F62A796156923D556A

SSDEEP:

98304:LP/h/5E1SZVY4MGfYntAcNJDUK7MqAsg6oplLsEEyb1/ccTdbmZ+ke4lEcI76/gt:kIBbnKtHWE9OkUri41ZhmAse

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Known privilege escalation attack

      • dllhost.exe (PID: 5348)
  • SUSPICIOUS

    • Starts itself from another location

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 4948)
      • ActiveISO.exe (PID: 3672)
    • Executable content was dropped or overwritten

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 4948)
      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
      • cmd.exe (PID: 4692)
    • Process drops legitimate windows executable

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
    • The process drops C-runtime libraries

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
    • Starts CMD.EXE for commands execution

      • ActiveISO.exe (PID: 7044)
      • ActiveISO.exe (PID: 3628)
    • The executable file from the user directory is run by the CMD process

      • DriverProtectv1.exe (PID: 892)
    • Reads the date of Windows installation

      • DriverProtectv1.exe (PID: 892)
  • INFO

    • Create files in a temporary directory

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 4948)
      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 7044)
      • ActiveISO.exe (PID: 3628)
    • Checks supported languages

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 4948)
      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
      • ActiveISO.exe (PID: 7044)
      • ActiveISO.exe (PID: 3628)
      • DriverProtectv1.exe (PID: 892)
    • The sample compiled with english language support

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 4948)
      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
    • Reads the computer name

      • 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe (PID: 3148)
      • ActiveISO.exe (PID: 3672)
      • ActiveISO.exe (PID: 7044)
      • DriverProtectv1.exe (PID: 892)
      • ActiveISO.exe (PID: 3628)
    • Creates files or folders in the user directory

      • ActiveISO.exe (PID: 3672)
    • Reads security settings of Internet Explorer

      • dllhost.exe (PID: 5348)
    • Reads the machine GUID from the registry

      • DriverProtectv1.exe (PID: 892)
    • Checks proxy server information

      • slui.exe (PID: 6688)
      • DriverProtectv1.exe (PID: 892)
    • Reads the software policy settings

      • slui.exe (PID: 6688)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:11:18 22:00:38+00:00
ImageFileCharacteristics: Executable, 32-bit, Removable run from swap, Net run from swap
PEType: PE32
LinkerVersion: 14.11
CodeSize: 301568
InitializedDataSize: 160768
UninitializedDataSize: -
EntryPoint: 0x2e2a6
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 5.3.10.0
ProductVersionNumber: 5.3.10.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Cyme
FileDescription: Antonomasia
FileVersion: 5.3.10.0
InternalName: setup
LegalCopyright: Copyright (c) Cyme. All rights reserved.
OriginalFileName: psyche.exe
ProductName: Antonomasia
ProductVersion: 5.3.10.0
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
153
Monitored processes
12
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe 3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe activeiso.exe activeiso.exe no specs cmd.exe no specs conhost.exe no specs CMSTPLUA activeiso.exe no specs cmd.exe conhost.exe no specs slui.exe driverprotectv1.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
892C:\Users\admin\AppData\Local\Temp\DriverProtectv1.exeC:\Users\admin\AppData\Local\Temp\DriverProtectv1.execmd.exe
User:
admin
Company:
Nenad Hrg (SoftwareOK.com)
Integrity Level:
HIGH
Description:
Q-Dir
Version:
11,4,4,0
Modules
Images
c:\users\admin\appdata\local\temp\rdforbc
c:\users\admin\appdata\local\temp\driverprotectv1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3148"C:\Users\admin\AppData\Local\Temp\{254E0AC9-174B-4FB2-9AD0-3B3B48DC0568}\.cr\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe" -burn.filehandle.attached=728 -burn.filehandle.self=732 C:\Users\admin\AppData\Local\Temp\{254E0AC9-174B-4FB2-9AD0-3B3B48DC0568}\.cr\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
User:
admin
Company:
Cyme
Integrity Level:
MEDIUM
Description:
Antonomasia
Exit code:
0
Version:
5.3.10.0
Modules
Images
c:\users\admin\appdata\local\temp\{254e0ac9-174b-4fb2-9ad0-3b3b48dc0568}\.cr\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
3628"C:\Users\admin\AppData\Roaming\remoteFastzq5\ActiveISO.exe" C:\Users\admin\AppData\Roaming\remoteFastzq5\ActiveISO.exedllhost.exe
User:
admin
Integrity Level:
HIGH
Description:
Active@ ISO Manager
Exit code:
1
Version:
24.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\remotefastzq5\activeiso.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\users\admin\appdata\roaming\remotefastzq5\starburn.dll
c:\windows\system32\gdi32full.dll
3672"C:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\ActiveISO.exe"C:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\ActiveISO.exe
3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Active@ ISO Manager
Exit code:
0
Version:
24.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\{5c269877-ab87-4fc4-b1bb-9d46c0598776}\.ba\activeiso.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
3832\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4692C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe
ActiveISO.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4948"C:\Users\admin\AppData\Local\Temp\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe" C:\Users\admin\AppData\Local\Temp\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
explorer.exe
User:
admin
Company:
Cyme
Integrity Level:
MEDIUM
Description:
Antonomasia
Exit code:
0
Version:
5.3.10.0
Modules
Images
c:\users\admin\appdata\local\temp\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5348C:\WINDOWS\SysWOW64\DllHost.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}C:\Windows\SysWOW64\dllhost.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ucrtbase.dll
c:\windows\syswow64\combase.dll
5372\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5496C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeActiveISO.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
2 019
Read events
2 018
Write events
1
Delete events
0

Modification events

(PID) Process:(5348) dllhost.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
Operation:writeName:SlowContextMenuEntries
Value:
6024B221EA3A6910A2DC08002B30309D0A010000BD0E0C47735D584D9CEDE91E22E23282770100000114020000000000C0000000000000468D0000006078A409B011A54DAFA526D86198A780390100009AD298B2EDA6DE11BA8CA68E55D895936E000000
Executable files
23
Suspicious files
2
Text files
2
Unknown types
1

Dropped files

PID
Process
Filename
Type
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\jri
MD5:
SHA256:
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\Bichromate.dllexecutable
MD5:86B7452F87B5C7F79F8B8A3AD326035E
SHA256:58A6B1FE90145F8AE431D05952D1751E705AE46A81BE1C2257F5E1E0CE0292C7
49483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{254E0AC9-174B-4FB2-9AD0-3B3B48DC0568}\.cr\3bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeexecutable
MD5:73E9AB1674C64F040DA642B6A4690356
SHA256:04BB4867D35E77E8E391F3829CF07A542A73815FC8BE975A7733790D6E04243C
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\msvcp140.dllexecutable
MD5:7DB24201EFEA565D930B7EC3306F4308
SHA256:72FE4598F0B75D31CE2DC621E8EF161338C6450BB017CD06895745690603729E
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\Qt5Core.dllexecutable
MD5:6E8BFE548CA4DE868C82279E5D127DB0
SHA256:F7BDDCD19A740E179827A99C23CC045D6F4AB8D5B6699592B1A1E8FCB6DDC22F
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\Qt5Gui.dllexecutable
MD5:34893CB3D9A2250F0EDECD68AEDB72C7
SHA256:CA8334B2E63BC01F0749AFEB9E87943C29882131EFE58608EA25732961B2DF34
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\Qt5PrintSupport.dllexecutable
MD5:D0634933DB2745397A603D5976BEE8E7
SHA256:7D91D3D341DBBA568E2D19382E9D58A42A0D78064C3AD7ADFE3C7BB14742C2B1
3672ActiveISO.exeC:\Users\admin\AppData\Roaming\remoteFastzq5\jri
MD5:
SHA256:
31483bf4932e6121846f3303818932219f7984ac60196b65e4f62a796156923d556a.exeC:\Users\admin\AppData\Local\Temp\{5C269877-AB87-4FC4-B1BB-9D46C0598776}\.ba\ActiveISO.exeexecutable
MD5:B84DFABE933D1160F624693D94779CE5
SHA256:588CB61B36A001384A2833BD5DF8D7982CA79D6AE17A3D83A94E01B1E79684BD
7044ActiveISO.exeC:\Users\admin\AppData\Local\Temp\61f35cf9
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
23
DNS requests
26
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6936
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
23.216.77.28:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7004
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
104.76.201.34:80
http://x1.c.lencr.org/
unknown
whitelisted
7004
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7008
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
6936
svchost.exe
40.126.31.71:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6936
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
1268
svchost.exe
23.216.77.28:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.3.109.244:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.206
whitelisted
login.live.com
  • 40.126.31.71
  • 20.190.159.131
  • 40.126.31.69
  • 40.126.31.131
  • 40.126.31.1
  • 40.126.31.3
  • 20.190.159.23
  • 40.126.31.67
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
crl.microsoft.com
  • 23.216.77.28
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.3.109.244
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
self.events.data.microsoft.com
  • 52.182.143.214
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info