File name:

OInstall.exe

Full analysis: https://app.any.run/tasks/3ec6183e-e74c-4b72-9d13-a194e419577b
Verdict: Malicious activity
Analysis date: May 12, 2025, 09:54:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections
MD5:

7E58CAA6E6C089C1EA4FA69528B4433D

SHA1:

4545993D5464A5270657F4A4009FE41CBDC758C5

SHA256:

4B1135F82C77D66CA0613988CF8C205F14D8A69F684A238CD51A4D7D3B058CAA

SSDEEP:

98304:850t7G+WFwLSD9E0B819rIiPxhawKUrIxKjzmc9E035VkTv9E0somRnJTYMAezxN:Eq

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • OInstall.exe (PID: 5072)
      • OInstall.exe (PID: 7200)
      • setup16.exe (PID: 8132)
  • SUSPICIOUS

    • Drops 7-zip archiver for unpacking

      • OInstall.exe (PID: 7200)
    • Executable content was dropped or overwritten

      • OInstall.exe (PID: 7200)
      • files.dat (PID: 7388)
    • Process drops legitimate windows executable

      • OInstall.exe (PID: 7200)
      • files.dat (PID: 7388)
    • Starts application with an unusual extension

      • cmd.exe (PID: 7332)
    • Starts CMD.EXE for commands execution

      • OInstall.exe (PID: 7200)
    • The process drops C-runtime libraries

      • files.dat (PID: 7388)
    • Reads security settings of Internet Explorer

      • setup16.exe (PID: 8132)
    • Searches for installed software

      • setup16.exe (PID: 8132)
    • Starts a Microsoft application from unusual location

      • setup16.exe (PID: 8132)
  • INFO

    • Reads Environment values

      • OInstall.exe (PID: 7200)
    • Checks supported languages

      • OInstall.exe (PID: 7200)
      • files.dat (PID: 7388)
      • setup16.exe (PID: 8132)
    • Reads the computer name

      • OInstall.exe (PID: 7200)
      • setup16.exe (PID: 8132)
    • The sample compiled with english language support

      • OInstall.exe (PID: 7200)
      • files.dat (PID: 7388)
    • Process checks computer location settings

      • setup16.exe (PID: 8132)
    • Reads Microsoft Office registry keys

      • setup16.exe (PID: 8132)
    • Checks proxy server information

      • setup16.exe (PID: 8132)
      • slui.exe (PID: 5392)
    • Reads the machine GUID from the registry

      • setup16.exe (PID: 8132)
    • Create files in a temporary directory

      • setup16.exe (PID: 8132)
    • Creates files or folders in the user directory

      • setup16.exe (PID: 8132)
    • Reads the software policy settings

      • setup16.exe (PID: 8132)
      • slui.exe (PID: 5392)
    • UPX packer has been detected

      • OInstall.exe (PID: 7200)
    • Reads CPU info

      • setup16.exe (PID: 8132)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (24)
.exe | Win64 Executable (generic) (21.3)
.exe | UPX compressed Win32 Executable (20.8)
.exe | Win32 EXE Yoda's Crypter (20.4)
.dll | Win32 Dynamic Link Library (generic) (5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:29 12:45:22+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 2.5
CodeSize: 719360
InitializedDataSize: 8532992
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 5.3.0.0
ProductVersionNumber: 5.3.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Unknown (0)
ObjectFileType: Unknown
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
144
Monitored processes
10
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start oinstall.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs files.dat setup16.exe conhost.exe no specs slui.exe oinstall.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
5072"C:\Users\admin\Desktop\OInstall.exe" C:\Users\admin\Desktop\OInstall.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\oinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
5392C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
7200"C:\Users\admin\Desktop\OInstall.exe" C:\Users\admin\Desktop\OInstall.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\oinstall.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7240"C:\WINDOWS\Sysnative\cmd.exe" /D /c copy C:\WINDOWS\system32\Tasks\OInstall "\OInstall.tmp" /YC:\Windows\System32\cmd.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
7248\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7332"C:\WINDOWS\Sysnative\cmd.exe" /D /c files.dat -y -pkmsautoC:\Windows\System32\cmd.exeOInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
7340\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7388files.dat -y -pkmsautoC:\Users\admin\Desktop\files\files.dat
cmd.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\files\files.dat
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
8132"C:\Users\admin\Desktop\files\Setup16.exe" /configure Configure.xmlC:\Users\admin\Desktop\files\setup16.exe
OInstall.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Office
Exit code:
0
Version:
16.0.6831.5775
Modules
Images
c:\users\admin\desktop\files\setup16.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
8148\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exesetup16.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
4 889
Read events
4 876
Write events
9
Delete events
4

Modification events

(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Registration
Operation:writeName:AcceptAllEulas
Value:
1
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Registration\DESKTOP-JGLLJLD
Operation:writeName:none.AttemptGetKey
Value:
1
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified
Operation:writeName:setup16.exe_queried
Value:
96C5216800000000
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified
Operation:writeName:setup16.exe
Value:
Mon, 12 May 2025 09:55:34 GMT
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\setup16.exe
Operation:writeName:RulesEndpoint
Value:
https://nexusrules.officeapps.live.com/nexus/rules?Application=C2R.exe&Version=16.0.6831.5775&ClientId={D61AB268-C26A-439D-BB15-2A0DEDFCA6A3}&OSEnvironment=10&MsoAppId=37&AudienceName=Unknown&AudienceGroup=Unknown&AppVersion=16.0.6831.5775&
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\setup16.exe
Operation:delete valueName:RulesEndpoint
Value:
https://nexusrules.officeapps.live.com/nexus/rules?Application=C2R.exe&Version=16.0.6831.5775&ClientId={D61AB268-C26A-439D-BB15-2A0DEDFCA6A3}&OSEnvironment=10&MsoAppId=37&AudienceName=Unknown&AudienceGroup=Unknown&AppVersion=16.0.6831.5775&
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\setup16.exe
Operation:delete keyName:(default)
Value:
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\setup16.exe\ULSMonitor
Operation:writeName:ULSTagIds0
Value:
5601374,5601379,5804129,7202269,17102418,7168707,595174593,17962391,595174594,17962392,593359442,593359441,22929429
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\16.0\Common\ClientTelemetry\RulesEngineThrottling
Operation:writeName:SpikeFactor
Value:
12
(PID) Process:(8132) setup16.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\Common\ClientTelemetry
Operation:writeName:ULSQueueSize
Value:
20480
Executable files
6
Suspicious files
14
Text files
8
Unknown types
0

Dropped files

PID
Process
Filename
Type
7388files.datC:\Users\admin\Desktop\files\x86\cleanospp.exeexecutable
MD5:5FD363D52D04AC200CD24F3BCC903200
SHA256:3FDEFE2AD092A9A7FE0EDF0AC4DC2DE7E5B9CE6A0804F6511C06564194966CF9
7200OInstall.exeC:\Users\admin\Desktop\files\files.datexecutable
MD5:BB81E763AB0E673B3C1AF2FEA2586A9A
SHA256:4D45C64B244C8F997358635C3B5CB9A65743FAC473D65C455D3BA8A25E50D5F9
8132setup16.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\696F3DE637E6DE85B458996D49D759ADbinary
MD5:6872FAE8288DB34207D9E7EE350157F4
SHA256:50795B027E2BC566D3B7ACB89913F8EFD23B70615C9DB9BF5B23323AD3132A7D
7388files.datC:\Users\admin\Desktop\files\x64\cleanospp.exeexecutable
MD5:162AB955CB2F002A73C1530AA796477F
SHA256:5CE462E5F34065FC878362BA58617FAB28C22D631B9D836DDDCF43FB1AD4DE6E
7388files.datC:\Users\admin\Desktop\files\Uninstall.xmltext
MD5:364F86F97324EA82FE0D142CD01CF6DD
SHA256:09D5B42140BAB13165BA97FBD0E77792304C3C93555BE02C3DCE21A7A69C66DD
8132setup16.exeC:\Users\admin\AppData\Local\Temp\OfficeC2R614B8086-41CA-437B-8FC6-3E8FE9B62795\v32.cabcompressed
MD5:753724165DE60BD32C59A403062923B2
SHA256:BA25514A2353C1FB8AAE0A03588D3C4859958E59BE06DAB32E8E2B5ABB63DA13
7200OInstall.exeC:\Users\admin\Desktop\files\Configure.xmltext
MD5:26DC72870C91D34FC404F25D98077C70
SHA256:EB955B18634FA1EF6DC08E11F551803A7B07F20181FB4943E403F875DAE9C2A9
8132setup16.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7396C420A8E1BC1DA97F1AF0D10BAD21binary
MD5:E07178901A4EAAC2816BB238EC3A80DB
SHA256:EEBD04C1272661E1091084108083CE44F7C961013791892D866B2F92EE3DEDA8
7200OInstall.exeC:\Users\admin\Desktop\files\setup16.exeexecutable
MD5:C3CB16674CA1787AD44552766D93216F
SHA256:3EAA729D17BD14833B8E9B720F67F09C35735E13A4814E56B9DB0FD402629623
7388files.datC:\Users\admin\Desktop\files\x86\msvcr100.dllexecutable
MD5:BF38660A9125935658CFA3E53FDC7D65
SHA256:60C06E0FA4449314DA3A0A87C1A9D9577DF99226F943637E06F61188E5862EFA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
28
DNS requests
21
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
8132
setup16.exe
HEAD
200
23.48.23.48:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32.cab
unknown
whitelisted
7988
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
8132
setup16.exe
GET
200
23.48.23.48:80
http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32.cab
unknown
whitelisted
7988
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
8132
setup16.exe
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/microsoftrootcert.crl
unknown
whitelisted
8132
setup16.exe
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/MicCodSigPCA_08-31-2010.crl
unknown
whitelisted
8132
setup16.exe
GET
200
23.48.23.158:80
http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7988
SIHClient.exe
20.109.210.53:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
  • 23.48.23.158
  • 23.48.23.156
  • 23.48.23.173
  • 23.48.23.162
  • 23.48.23.177
  • 23.48.23.180
  • 23.48.23.169
  • 23.48.23.190
  • 23.48.23.141
whitelisted
google.com
  • 142.250.185.142
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.249
  • 172.211.123.248
whitelisted
login.live.com
  • 20.190.159.128
  • 20.190.159.23
  • 40.126.31.129
  • 40.126.31.73
  • 40.126.31.69
  • 40.126.31.2
  • 20.190.159.71
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted

Threats

No threats detected
No debug info