File name:

一键通往二次元.exe

Full analysis: https://app.any.run/tasks/902b5b95-ccc0-43f1-8689-50c7921f5d91
Verdict: Malicious activity
Analysis date: June 22, 2025, 06:59:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
pyinstaller
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64, for MS Windows, 6 sections
MD5:

16ABB374EB1B759235AAEA1B03EEF712

SHA1:

495B467CE61E5D891690FAED3CAABCB04156C56A

SHA256:

4608BCC2632C46335CD9FABEED46837C4FAE07D624BC86CDBB43CECC0B701DD1

SSDEEP:

393216:LlvWJzq/qE6xebU0ybDPEHDO+hGLZFMwdIhaQE:L1WJzq/5RJfjOu+W0

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • cmd.exe (PID: 7116)
  • SUSPICIOUS

    • Process drops python dynamic module

      • 一键通往二次元.exe (PID: 6680)
    • Process drops legitimate windows executable

      • 一键通往二次元.exe (PID: 6680)
    • Executable content was dropped or overwritten

      • 一键通往二次元.exe (PID: 6680)
    • The process drops C-runtime libraries

      • 一键通往二次元.exe (PID: 6680)
    • Application launched itself

      • 一键通往二次元.exe (PID: 6680)
    • Loads Python modules

      • 一键通往二次元.exe (PID: 632)
    • Starts CMD.EXE for commands execution

      • 一键通往二次元.exe (PID: 632)
    • Hides command output

      • cmd.exe (PID: 7116)
    • Uses ATTRIB.EXE to modify file attributes

      • cmd.exe (PID: 6896)
      • cmd.exe (PID: 6228)
    • Changes the desktop background image

      • 一键通往二次元.exe (PID: 632)
    • There is functionality for taking screenshot (YARA)

      • 一键通往二次元.exe (PID: 6680)
      • 一键通往二次元.exe (PID: 632)
  • INFO

    • Reads the computer name

      • 一键通往二次元.exe (PID: 6680)
      • 一键通往二次元.exe (PID: 632)
    • Checks supported languages

      • 一键通往二次元.exe (PID: 6680)
      • 一键通往二次元.exe (PID: 632)
    • The sample compiled with english language support

      • 一键通往二次元.exe (PID: 6680)
    • Create files in a temporary directory

      • 一键通往二次元.exe (PID: 6680)
      • 一键通往二次元.exe (PID: 632)
    • Checks proxy server information

      • 一键通往二次元.exe (PID: 632)
      • slui.exe (PID: 6404)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 5780)
    • PyInstaller has been detected (YARA)

      • 一键通往二次元.exe (PID: 6680)
      • 一键通往二次元.exe (PID: 632)
    • Reads the software policy settings

      • slui.exe (PID: 6404)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | InstallShield setup (57.6)
.exe | Win64 Executable (generic) (36.9)
.exe | Generic Win/DOS Executable (2.6)
.exe | DOS Executable Generic (2.6)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:06:20 05:27:02+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 14.4
CodeSize: 167936
InitializedDataSize: 104448
UninitializedDataSize: -
EntryPoint: 0xbe20
OSVersion: 5.2
ImageVersion: -
SubsystemVersion: 5.2
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
15
Malicious processes
2
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 一键通往二次元.exe 一键通往二次元.exe cmd.exe no specs conhost.exe no specs schtasks.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs cmd.exe no specs conhost.exe no specs attrib.exe no specs cmd.exe no specs conhost.exe no specs notepad.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
632"C:\Users\admin\AppData\Local\Temp\一键通往二次元.exe" C:\Users\admin\AppData\Local\Temp\一键通往二次元.exe
一键通往二次元.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\一键通往二次元.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2296C:\WINDOWS\system32\cmd.exe /c notepad %UserProfile%\Desktop\PLEASE_README_TO_SAVE.txtC:\Windows\System32\cmd.exe一键通往二次元.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2808\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4372\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4580attrib +s +h "C:\Users\admin\Desktop\logo.ico"C:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
4768\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4816\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
5780notepad C:\Users\admin\Desktop\PLEASE_README_TO_SAVE.txtC:\Windows\System32\notepad.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5900attrib +s +h "C:\Users\admin\Desktop\main_bg.png"C:\Windows\System32\attrib.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Attribute Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\attrib.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
6228C:\WINDOWS\system32\cmd.exe /c attrib +s +h "C:\Users\admin\Desktop\logo.ico"C:\Windows\System32\cmd.exe一键通往二次元.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
Total events
7 152
Read events
7 151
Write events
1
Delete events
0

Modification events

(PID) Process:(632) ä¸€é”®é€šå¾€äºŒæ¬¡å…ƒ.exeKey:HKEY_CURRENT_USER\Control Panel\Desktop
Operation:writeName:Wallpaper
Value:
%UserProfile%\Desktop\main_bg.png
Executable files
100
Suspicious files
2
Text files
24
Unknown types
0

Dropped files

PID
Process
Filename
Type
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\PIL\_imaging.cp312-win_amd64.pydexecutable
MD5:0376776F076CD4F4AC15EC4D813C5470
SHA256:A7DDF4D7CAB08676BB88A42059353C5374600901B3AB880E17EE1A0D0150C380
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\PIL\_imagingcms.cp312-win_amd64.pydexecutable
MD5:48F7F14636DA0BC081A34ACBFE30D77D
SHA256:3C2CEDEBABB5748F78FBA56634FD49CDAAD02C18D808D7E2B4F50E2800C7930F
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\Pythonwin\win32ui.pydexecutable
MD5:621449EFF843B6128E15BA20B40E2688
SHA256:AA9F43412393CD50340570ABF6AE6FD5C3A2119555B5D6CAF43AC693CC2AA244
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\VCRUNTIME140.dllexecutable
MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
SHA256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\PIL\_webp.cp312-win_amd64.pydexecutable
MD5:12D05951F8004E24EEAA0E45D587FE8E
SHA256:D96B196126A033F1D7832E29CEE44928683FAB00242E812815FF95FFFED1AF54
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\_asyncio.pydexecutable
MD5:70FB0B118AC9FD3292DDE530E1D789B8
SHA256:F8305023F6AD81DDC7124B311E500A58914B05A9B072BF9A6D079EA0F6257793
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\VCRUNTIME140_1.dllexecutable
MD5:F8DFA78045620CF8A732E67D1B1EB53D
SHA256:A113F192195F245F17389E6ECBED8005990BCB2476DDAD33F7C4C6C86327AFE5
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\Pythonwin\mfc140u.dllexecutable
MD5:84B82C149B450D3C8E0D06F09A416B5D
SHA256:1EC2A31A1302E720C799BAD2FD90CF3457C6B2A375C4B41FAEFEE1A91D92F3E0
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\PIL\_imagingtk.cp312-win_amd64.pydexecutable
MD5:7E912D07A39E16BB25CF32B7153515C8
SHA256:D1E5D023821A9C38967FFAA9BDBF4DDE998A3A6BC37942CA334A13E55A1FC711
6680一键通往二次元.exeC:\Users\admin\AppData\Local\Temp\_MEI66802\PIL\_imagingmath.cp312-win_amd64.pydexecutable
MD5:8F67156CE61C7DE23E19F9445C8BA504
SHA256:8287A2A551BD99B5D55E18E461FEDB3704B74B0FB60F1E0881C792F90A18CE46
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
29
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3100
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
184.24.77.12:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2940
svchost.exe
GET
200
2.16.252.233:80
http://x1.c.lencr.org/
unknown
whitelisted
6376
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6376
SIHClient.exe
GET
200
2.23.181.156:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6172
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3100
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3100
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2336
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
632
一键通往二次元.exe
49.232.237.64:443
tc.z.wiki
Shenzhen Tencent Computer Systems Company Limited
CN
unknown
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.142
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.69
  • 40.126.31.2
  • 40.126.31.3
  • 20.190.159.4
  • 20.190.159.75
  • 40.126.31.129
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
tc.z.wiki
  • 49.232.237.64
unknown
crl.microsoft.com
  • 184.24.77.12
  • 184.24.77.7
  • 184.24.77.38
  • 184.24.77.42
  • 184.24.77.11
  • 184.24.77.23
whitelisted
www.microsoft.com
  • 2.23.181.156
whitelisted
nexusrules.officeapps.live.com
  • 52.111.236.21
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted

Threats

No threats detected
No debug info