File name:

VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe

Full analysis: https://app.any.run/tasks/6118d3c9-1b36-4418-a678-bfc2df2163c1
Verdict: Malicious activity
Analysis date: May 17, 2025, 17:22:06
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections
MD5:

1E23B68FA01505AA2A1A2873D14E7F57

SHA1:

5AEEA5499DCF811818A3C1AEB0817CA07D18DF4A

SHA256:

4E58B502312E66BA984444A552877B90067058C59E940C4DA7833869AE90A911

SSDEEP:

12288:ZIiNsFdVDo6tl5USUBN/PoamrXJ5KuB/E99kmMZ/MLEmpVaJ:Zn+To6tl5USUBZwnrXJ5KuB/M9kmW/Ma

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 6808)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
      • 7za.exe (PID: 7512)
    • Drops 7-zip archiver for unpacking

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
    • Uses WMIC.EXE to obtain BIOS management information

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
    • Uses WMIC.EXE to obtain Windows Installer data

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
  • INFO

    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 900)
      • WMIC.exe (PID: 7336)
      • WMIC.exe (PID: 7252)
      • WMIC.exe (PID: 7420)
    • Checks supported languages

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
      • 7za.exe (PID: 7512)
    • The sample compiled with english language support

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
    • Create files in a temporary directory

      • VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe (PID: 1852)
      • 7za.exe (PID: 7512)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (94.8)
.exe | Win32 Executable MS Visual C++ (generic) (3.4)
.dll | Win32 Dynamic Link Library (generic) (0.7)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 22:50:46+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 23552
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x323c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.1
ProductVersionNumber: 1.0.0.1
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
FileVersion: 1.0.0.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
143
Monitored processes
14
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start virusshare_1e23b68fa01505aa2a1a2873d14e7f57.exe wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs wmic.exe no specs conhost.exe no specs 7za.exe conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs virusshare_1e23b68fa01505aa2a1a2873d14e7f57.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
900WMIC csproduct Get UUID /FORMAT:textvaluelist.xslC:\Windows\SysWOW64\wbem\WMIC.exeVirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1852"C:\Users\admin\AppData\Local\Temp\VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe" C:\Users\admin\AppData\Local\Temp\VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
2
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\virusshare_1e23b68fa01505aa2a1a2873d14e7f57.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4300\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6808"C:\Users\admin\AppData\Local\Temp\VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe" C:\Users\admin\AppData\Local\Temp\VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\virusshare_1e23b68fa01505aa2a1a2873d14e7f57.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
7252WMIC bios Get SerialNumber /FORMAT:textvaluelist.xslC:\Windows\SysWOW64\wbem\WMIC.exeVirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7260\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7336WMIC bios Get Version /FORMAT:textvaluelist.xslC:\Windows\SysWOW64\wbem\WMIC.exeVirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7344\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7420WMIC csproduct Get Name /FORMAT:textvaluelist.xslC:\Windows\SysWOW64\wbem\WMIC.exeVirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7428\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeWMIC.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
982
Read events
982
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
1
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
1852VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exeC:\Users\admin\AppData\Local\Temp\nsoB48E.tmp\[RANDOM_STRING].7zexecutable
MD5:84EA538EE1E7EEB6FF4E28EBD3E4D460
SHA256:6BDD981F9217E26EDF3B07E5B9A0A97A7972DF0D4FABEC6E8C10A246FAA06740
1852VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exeC:\Users\admin\AppData\Local\Temp\nsoB48E.tmp\7za.exeexecutable
MD5:42BADC1D2F03A8B1E4875740D3D49336
SHA256:C136B1467D669A725478A6110EBAAAB3CB88A3D389DFA688E06173C066B76FCF
1852VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exeC:\Users\admin\AppData\Local\Temp\nsoB48D.tmpbinary
MD5:8B8CF3FDCDCF676210947CF00E0016EE
SHA256:5F3C2BA7E3E3F18A1ED0458997057FC0B4EC6FEB49C366AB40FF0947CEB36930
75127za.exeC:\Users\admin\AppData\Local\Temp\nsoB48E.tmp\install29249.exeexecutable
MD5:10BD2AF1B07EC6BC9CD17BA512569E59
SHA256:9C620EF6EAC3D0D9D3F6F2622A53D1F543CEBD93846636BA397683962C07FC7C
1852VirusShare_1e23b68fa01505aa2a1a2873d14e7f57.exeC:\Users\admin\AppData\Local\Temp\nsoB48E.tmp\nsExec.dllexecutable
MD5:ACC2B699EDFEA5BF5AAE45ABA3A41E96
SHA256:168A974EAA3F588D759DB3F47C1A9FDC3494BA1FA1A73A84E5E3B2A4D58ABD7E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
8160
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
8160
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.69:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
8160
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
login.live.com
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.68
  • 40.126.31.129
  • 20.190.159.0
  • 40.126.31.73
  • 20.190.159.2
  • 40.126.31.3
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info